About 25,400 results
Open links in new tab
  1. hash - What are preimage resistance and collision resistance, and …

    What is "preimage resistance", and how can the lack thereof be exploited? How is this different from collision resistance, and are there any known preimage attacks that would be considered …

  2. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more …

  3. What is the difference between a digest and a hash function?

    Sep 1, 2017 · A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, …

  4. How to find the 6 main properties of cryptographic hash functions …

    Jan 19, 2022 · Collision resistant: it is infeasible to find two different messages with the same hash value Pre-image attack resistant: a pre-image attack on cryptographic hash functions …

  5. Difference between "one-way function" and "cryptographic hash …

    Jun 19, 2013 · Hmm. Was this question asking about the difference between one-way hash functions and cryptographic hash functions, or general one-way functions and cryptographic …

  6. terminology - Does a hash function necessarily need to allow …

    Jan 11, 2021 · A cryptographic hash function is a kind of hash function that has some additional security-related properties. Like in the general case, the input doesn't have to be the set of all …

  7. implementation - Fast cryptographic hash function for short inputs ...

    Oct 9, 2020 · I am looking for a cryptographic hash function optimized for speed on short inputs, in order to implement a pseudorandom generator with expansion factor 2 (e.g. takes 16 bytes …

  8. Can we use a Cryptographic hash function to generate infinite …

    Dec 12, 2019 · A cryptographic hash function can be used to generate (pseudo-) random bits of an apparent quality comparable to dedicated random number generators. I say "apparent" …

  9. hash - Computational requirements for breaking SHA-256?

    Oct 27, 2017 · The expected number of trial to find a preimage of a random (-like) function with 256-bit output (like a hash aims to be) is $2^ {256}$ queries. Justification: the probability of …

  10. Would it be any good to create a new cryptographic hash function?

    Nov 7, 2021 · A cryptographic hash function is pretty much a pseudorandom string generating algorithm and it can easily be made difficult to break by increasing the number of possible …