About 18,400 results
Open links in new tab
  1. Why AES is not used for secure hashing, instead of SHA-x?

    A hash function is a single, fully defined, computable function which takes as input bit sequences of arbitrary length, and outputs values of a fixed length r (e.g. r = 256 bits for SHA-256). There …

  2. Why are hash functions one way? If I know the algorithm, why …

    It then compares the generated hash to the hash in the database. If there is a match, it works out the password. Why, if the password cracker knows the algorithm to turn a plain text password …

  3. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more …

  4. hash - What are preimage resistance and collision resistance, and …

    What is "preimage resistance", and how can the lack thereof be exploited? How is this different from collision resistance, and are there any known preimage attacks that would be considered …

  5. Checksum vs. Hash: Differences and Similarities?

    Sep 27, 2018 · A hash function maps some data to other data. It is often used to speed up comparisons or create a hash table. Not all hash functions are secure and the hash does not …

  6. cryptography - What is the difference between a Hash Function …

    The term "hash function" is vague—or more precisely, polysemous: it has a "family" of meanings that are closely related but distinct. If somebody labels a function as a "hash function," the …

  7. What is the difference between a digest and a hash function?

    Sep 1, 2017 · 26 The basic difference between a hash function and digest is that digest is the value obtained from a hash function. A hash function is any function that can be used to map …

  8. How does GHASH used in GCM behave as a universal hashing …

    Feb 12, 2021 · I thought a universal hash used something like a nonce to pick a diff function from a family of function. If it uses a fixed key, then how is it different from regular hash functions …

  9. Methods used to reverse a hash - Information Security Stack …

    3 I know that a hash is a one-way-function and that therefore there isn't a reversal function. By reversing a hash I just mean to find some plaintext that gives the hash. I think that I …

  10. hash - Computational requirements for breaking SHA-256?

    Oct 27, 2017 · Also, the term "breaking a hash function" in theoretical context actually means, that the attack requires less complexity than the just a full search / brute force.