Sha
How long to brute force a salted SHA-512 hash? (salt provided)
Here is an algorithm in Java开发者_开发知识库: public String getHash(String password, String salt) throws Exception {[详细]
2023-03-22 12:21 分类:问答Does Size of Bitstring Matter in Hashing Functions?
I\'m trying to create an implementation of PBKDF2 to generate a key to encrypt a file with AES-256, but I have a question about salt size. I plan to use SHA-256 and concatenate with the passphrase, so[详细]
2023-03-20 07:29 分类:问答Using an HMAC on an a already hashed value, good or bad practice?
Hi all I have a question on if this is good practice or not.I am aware that simply double hashing a value can be bad for various reasons.[详细]
2023-03-19 15:28 分类:问答How was SHA-0 broken? - What is the significance of a mere handful of hash collisions?
I wanted to understand how the SHA0 hash function was broken.I understand that utilising the birthday problem/pigeon-hold principle, hash collision(s) were found.http://www.mail-archive.com/cryptograp[详细]
2023-03-18 05:22 分类:问答What is the output format of SHA256
What is the output format of the SHA256? It is composed by lett开发者_开发知识库ers and numbers only? And it is case insensitive?As with most (all?) crypto hashes, the output of SHA-256 is binary data[详细]
2023-03-16 04:47 分类:问答Variable of unspecified type in C#?
Is it possible for me to declare a variable, without a type, then specify the type based on some conditions? For example, I want to create a SHA Hash object based what size the user would like to use:[详细]
2023-03-15 09:14 分类:问答GIT SHA id of a file on remote git branch
I would like to know if there is any command available to get the SHA id of a parti开发者_如何学编程cular file on a given specific git branch on the GIT remote server?[详细]
2023-03-12 05:39 分类:问答How to decrease the size of SHA1?
I have a problem, maybe a silly question, I want to store data in a database after I hash with the SHA1 algorithm. However, at a future time, the si开发者_如何学Cze in database will increase because s[详细]
2023-03-10 22:07 分类:问答Encrypting a file with a weak password, bcrypt or SHA-256 + AES-256?
I start with a weak password (8 lower case characters for ex) and a file. I need to encrypt that file using that password. Result has to be secure against known attacks.[详细]
2023-03-10 01:33 分类:问答Where is the SALT attached to the password, AFTER or BEFORE the password?
When you are using GNU/Linux, the password are (mainly) encripted in MD5 and SHA The operative system attaches a SALT to this password before encrypting it to avoid dictionary attacs.[详细]
2023-03-08 02:29 分类:问答