About 18,000 results
Open links in new tab
  1. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more …

  2. Checksum vs. Hash: Differences and Similarities?

    Sep 27, 2018 · A hash function maps some data to other data. It is often used to speed up comparisons or create a hash table. Not all hash functions are secure and the hash does not …

  3. What is the difference between a digest and a hash function?

    Sep 1, 2017 · A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, …

  4. cryptography - What is the difference between a Hash Function …

    Every cryptographic hash function is a hash function. But not every hash function is a cryptographic hash. A cryptographic hash function aims to guarantee a number of security …

  5. Why AES is not used for secure hashing, instead of SHA-x?

    A hash function is a single, fully defined, computable function which takes as input bit sequences of arbitrary length, and outputs values of a fixed length r (e.g. r = 256 bits for SHA-256). There …

  6. Why are hash functions one way? If I know the algorithm, why …

    It then compares the generated hash to the hash in the database. If there is a match, it works out the password. Why, if the password cracker knows the algorithm to turn a plain text password …

  7. hash - What are preimage resistance and collision resistance, and …

    What is "preimage resistance", and how can the lack thereof be exploited? How is this different from collision resistance, and are there any known preimage attacks that would be considered …

  8. Why hash the message before signing it with RSA?

    As diagram shows, the message is first hashed, and the signature is then computed on the hash, rather than on the full message. Why hash the data before signing it? Why not sign the whole …

  9. Are cryptographic hash functions quantum secure?

    May 14, 2017 · Are there hash functions considered secure just because nobody has come up with a quantum algorithm to solve it? Or are there any reduction to any well known hard problem?

  10. How does GHASH used in GCM behave as a universal hashing …

    Feb 12, 2021 · I thought a universal hash used something like a nonce to pick a diff function from a family of function. If it uses a fixed key, then how is it different from regular hash functions …