About 17,000 results
Open links in new tab
  1. Why are hash functions one way? If I know the algorithm, why …

    The hash function is designed so it is hard to reverse it and get any answer at all, even a different password with the same hash. In crypto-speak: a hash function vulnerable to a preimage …

  2. How does hashing work? - Information Security Stack Exchange

    Apr 8, 2013 · The hashing function is anything but random. However, randomization is employed to thwart attackers who build large dictionaries of passwords and hashes, that enable them to …

  3. Is there a hash function which has no collisions?

    27 Is there a hash function which has no collisions? To clarify: it would be some function which would produce variable-length output, and never produce the same output for differing input. It …

  4. Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · Why can't we? We can. The algorithm is trivial: try every possible string, ordered by length and then by alphabetical order, until you get one that hashes to the desired value. …

  5. Reversible Hash Function? - Information Security Stack Exchange

    Jul 13, 2014 · Is there any reversible hash function? The hash function like SHA and MD5 are not reversible. I would like to know if there exist some reversible hash functions?

  6. Rounds in a hashing function - Information Security Stack Exchange

    By executing a round of hashing, the crypt algorithm makes at least a one bit change to the message, resulting in a completely new hash. If the hash algorithm didn't have strong collision …

  7. How to securely hash passwords? - Information Security Stack …

    Nov 12, 2010 · Indeed, PBKDF2 and scrypt are KDF, not password hashing function -- and NIST "approves" of PBKDF2 as a KDF, not explicitly as a password hasher (but it is possible, with …

  8. Salted hashes vs HMAC? - Information Security Stack Exchange

    Most of discussions involving access credentials include references to "hashing salted passwords". Is this another way to referring to the HMAC algorithm or a totally different …

  9. How does a hashing function always return the same length hash?

    As of how a hash function manages to produce constant length output algorithmically: most modern hash functions operate block-wise on their input, padding the final block as necessary.

  10. How do databases/companies change their hashing algorithm?

    May 6, 2024 · Similar question where asked here multiple times already. See Hash function change, How to upgrade the hashing method of a live database without compromising …