Skip to main content
Filter by
Sorted by
Tagged with
1 vote
1 answer
71 views

Which hash algorithms support binary input of arbitrary bit length? [closed]

Background In theory, hash functions produce a binary number having bounded (often fixed) length from binary data of arbitrary length. In practice, specifications and implementations constrain the ...
smartcaveman's user avatar
  • 42.6k
-3 votes
2 answers
689 views

Which implementations of hash algorithms like SHA-256 for Java are thread-safe?

I need to compute SHA-256 hashes in a Java Application. Apaches HmacUtils seem appropriate for this. However, in the documentation it says "This class is immutable and thread-safe. However the ...
Falk Tandetzky's user avatar
0 votes
0 answers
97 views

Why generated signature by "Digital signature algorithm (SHA-256)" with CMS is not valid in my partner

I have big problem with signature I don't recognized why it's not work. I want to use AS2 over http with digital signature. Minimal Story: I generated private key, certificate and as result .pfx file ...
Makstvell's user avatar
1 vote
1 answer
696 views

Collision-free/cyrptographic hash function for small inputs

So I don't need a cryptographic hash function, but I do need to be sure that the likelihood of a collision is astronomically low. But I don't have an advisory, I'm generating all the objects that will ...
Jake's user avatar
  • 757
1 vote
1 answer
87 views

Generate strong password from a Big Integer

I have a big integer in javascript, having 128 single digit numbers. I generated this big integer from the hex sum of SHA3-512. I would like to derive a password from this big integer, following the ...
Wor Chan's user avatar
  • 181
0 votes
1 answer
192 views

Why does using salted hash on python and php give me different results?

I ran into a problem in translating code from PHP to Python. Initially, there is a PHP code that creates a salted hash of a password with verification, and this code works fine and performs its ...
Saint's user avatar
  • 11
0 votes
0 answers
481 views

How to write a perfect hash function for 36 strings?

Using the numbers 0-5 I need to write a perfect has function for 36 Student ID Strings with six characters and 3 integers (e.g. BYPLOK120). The hash function looks something like as follows: String [] ...
Bopolop's user avatar
  • 11
1 vote
1 answer
327 views

is there cryptographically secure hash algorithm/function that allows hashing faster when you concatenate more data?

I need to calculate hash codes for constantly growing dataset and it needs to be cryptographically secure if possible. For example hashing the series of natural numbers, first 1, then 12, then 123. If ...
Juzu's user avatar
  • 11
-3 votes
1 answer
961 views

3 Byte output hashing algorithm

So for a project that I am working on, I am trying to get a hashing algorithm but I don't know anything about hashing algorithms. The final outcome I would like to archive is inputing a 6 byte value ...
Zachary Denny's user avatar
0 votes
3 answers
1k views

In Hashing, can't we find AT LEAST one original text hashing to the given hash value

I have a basic question about hashing. It is said that hashing is one way. I have a doubt that if we simply reverse the steps in program/algorithm/logic then can't we find at least one input which ...
grit639's user avatar
  • 346
6 votes
4 answers
69k views

Hash 'hashcat': Token length exception

hashcat64.exe hashcat -m0 -a0 crackme.txt password.txt Device #1: Intel's OpenCL runtime(GPU only) is currently broken. We are waiting for updated OpenCL drivers from Intel Hash 'hashcat': Token ...
user avatar
0 votes
1 answer
261 views

How can I check which hash function is being used to create block hash in hyperledger fabric

I have to change the default hash function of hyperledger fabric. And to check if my hash function is being used, I need to check which hash function is being used to create a new block in hyperledger ...
qwert limframe's user avatar
0 votes
1 answer
247 views

Secp256k1 solidity contract assembly errors: SyntaxError: loop flag outdated. Please consider using "switch", "if" or "for" statements instead

I'm working on updating some smart contracts to deploy on the Ethereum blockchain, however the cryptographic primitive for this project are really outdated and I don't know enough about cryptography ...
meliodaxx's user avatar
1 vote
1 answer
641 views

Java SHA-256 Program provides wrong Hash

I was solving challenges on Hackerrank.com and I met with this challenge about the java SHA-256 Cryptographic hash functions. here I wrote the following piece of code as a solution. But some test ...
Avishka Dambawinna's user avatar
0 votes
1 answer
274 views

How can I disable concatenation when using hashlib's update method?

I've written a method for hashing passwords by using hashlib. I allow the user to send a password through a POST method, which is received by Flask and the password is subsequently hashed so that the ...
Zaltron's user avatar

15 30 50 per page
1
2 3 4 5
7