102 questions
1
vote
1
answer
71
views
Which hash algorithms support binary input of arbitrary bit length? [closed]
Background
In theory, hash functions produce a binary number having bounded (often fixed) length from binary data of arbitrary length.
In practice, specifications and implementations constrain the ...
-3
votes
2
answers
689
views
Which implementations of hash algorithms like SHA-256 for Java are thread-safe?
I need to compute SHA-256 hashes in a Java Application.
Apaches HmacUtils seem appropriate for this. However, in the documentation it says "This class is immutable and thread-safe. However the ...
0
votes
0
answers
97
views
Why generated signature by "Digital signature algorithm (SHA-256)" with CMS is not valid in my partner
I have big problem with signature I don't recognized why it's not work.
I want to use AS2 over http with digital signature.
Minimal Story:
I generated private key, certificate and as result .pfx file ...
1
vote
1
answer
696
views
Collision-free/cyrptographic hash function for small inputs
So I don't need a cryptographic hash function, but I do need to be sure that the likelihood of a collision is astronomically low. But I don't have an advisory, I'm generating all the objects that will ...
1
vote
1
answer
87
views
Generate strong password from a Big Integer
I have a big integer in javascript, having 128 single digit numbers. I generated this big integer from the hex sum of SHA3-512.
I would like to derive a password from this big integer, following the ...
0
votes
1
answer
192
views
Why does using salted hash on python and php give me different results?
I ran into a problem in translating code from PHP to Python.
Initially, there is a PHP code that creates a salted hash of a password with verification, and this code works fine and performs its ...
0
votes
0
answers
481
views
How to write a perfect hash function for 36 strings?
Using the numbers 0-5 I need to write a perfect has function for 36 Student ID Strings with six characters and 3 integers (e.g. BYPLOK120).
The hash function looks something like as follows:
String [] ...
1
vote
1
answer
327
views
is there cryptographically secure hash algorithm/function that allows hashing faster when you concatenate more data?
I need to calculate hash codes for constantly growing dataset and it needs to be cryptographically secure if possible. For example hashing the series of natural numbers, first 1, then 12, then 123.
If ...
-3
votes
1
answer
961
views
3 Byte output hashing algorithm
So for a project that I am working on, I am trying to get a hashing algorithm but I don't know anything about hashing algorithms. The final outcome I would like to archive is inputing a 6 byte value ...
0
votes
3
answers
1k
views
In Hashing, can't we find AT LEAST one original text hashing to the given hash value
I have a basic question about hashing. It is said that hashing is one way. I have a doubt that if we simply reverse the steps in program/algorithm/logic then can't we find at least one input which ...
6
votes
4
answers
69k
views
Hash 'hashcat': Token length exception
hashcat64.exe hashcat -m0 -a0 crackme.txt password.txt
Device #1: Intel's OpenCL runtime(GPU only) is currently broken. We
are waiting for updated OpenCL drivers from Intel
Hash 'hashcat': Token ...
0
votes
1
answer
261
views
How can I check which hash function is being used to create block hash in hyperledger fabric
I have to change the default hash function of hyperledger fabric.
And to check if my hash function is being used, I need to check which hash function is being used to create a new block in hyperledger ...
0
votes
1
answer
247
views
Secp256k1 solidity contract assembly errors: SyntaxError: loop flag outdated. Please consider using "switch", "if" or "for" statements instead
I'm working on updating some smart contracts to deploy on the Ethereum blockchain, however the cryptographic primitive for this project are really outdated and I don't know enough about cryptography ...
1
vote
1
answer
641
views
Java SHA-256 Program provides wrong Hash
I was solving challenges on Hackerrank.com and I met with this challenge about the java SHA-256 Cryptographic hash functions. here
I wrote the following piece of code as a solution. But some test ...
0
votes
1
answer
274
views
How can I disable concatenation when using hashlib's update method?
I've written a method for hashing passwords by using hashlib.
I allow the user to send a password through a POST method, which is received by Flask and the password is subsequently hashed so that the ...