What is a hash
Where is it used
- Hash functions: An empirical comparison
- hash's for hashmaps do not need to be cryptographically secure and can be simpler and faster.
- This article show comparison of loads of simple small hash functions and their performance with collisions and similar input data
Why
- https://www.quora.com/What-is-the-simplest-example-of-a-hash-function
- FNV1
- FNV-1
- PolymurHash is a 64-bit universal hash function designed for use in hash tables. It has a couple desirable properties:
- 32bytes memory, mathmatically proven low colision, 49bytes = 21 cylces
MD5 SHA1 SHA-2 SHA256? Argon2
Fast as possible - uniform as possible
We Didn't Encrypt Your Password, We Hashed It. Here's What That Means:
A password hash is a representation of your password that can't be reversed, but the original password may still be determined if someone hashes it again and gets the same result.
-
Secure Hash Algorithms SHA1 Example
-
SHA-1 ‘Fully and Practically Broken’ By New Collision 2020
-
Our work show that SHA-1 is now fully and practically broken for use in digital signatures. GPU technology improvements and general computation cost decrease will quickly render our attack even cheaper, making it basically possible for any ill-intentioned attacker in the very near future
- [security]
-
-
sha256-animation in terminal
-
Argon2 - Hash Generator & Verifier
- Generate password hashes with Argon2 algorithm, the winner of the Password Hashing Competition
- Argon2 is cryptographic hashing algorithm, most recommended for password hashing.
- Argon2 has 6 input parameters: password, salt, memory cost (the memory usage of the algorithm), time cost (the execution time of the algorithm and the number of iterations), parallelism factor (the number of parallel threads), hash length.
Data-space What 3 Words - Entire planet in 3m squares from 3 words
-
Modern perfect hashing for strings
- [dynamic-programming] is based on hashing strings
-
Free Online Favicon Hash Generator
- What is a Favicon Hash?
- A favicon hash is a unique identifier generated from a website's favicon (the small icon shown in browser tabs). This hash can be used for various OSINT (Open Source Intelligence) purposes, including:
- Identifying related websites using the same favicon
- Finding subdomains of an organization
- Tracking website changes over time
- Discovering hidden or related web assets
- A favicon hash is a unique identifier generated from a website's favicon (the small icon shown in browser tabs). This hash can be used for various OSINT (Open Source Intelligence) purposes, including:
- What is a Favicon Hash?