Questions tagged [hash]

A hash algorithm is a function which takes a variable size input and produces a fixed size output. The algorithm tries to make it difficult to predict the output for a given input, find two inputs with the same output, or reconstruct the input from the output.

2201 questions
1
vote
1 answer

Tools to produce an MD5 collision?

I'd like to learn a bit more about MD5 collisions. So let's assume I have a message m: m = somesecretmessage And I hash that message: z = md5(m) The only know information is z. I do not know m. How would I be able to generate a file/string that…
Kyu96
  • 165
  • 1
  • 7
1
vote
1 answer

Is there a unique way to identify a hardware?

I'm considering an environment in which I will have to identify a computer. In this scenario all hardware parts (CPU, HDDs, RAM, etc) won't change, while I'd like to consider a changing OS. The goal is not to have to rely on any additional software…
kknickkk
  • 13
  • 4
1
vote
1 answer

Can I crack a zip file using Hash Suite on Windows?

I'm trying to crack a password I set on a zip file using Hash Suite but it doesn't seem to work for me (not sure if I'm doing everything correctly). Basically, this is what I've done: Created a text file, compressed it to a zip file with WinRar…
Alkrig
  • 13
  • 1
  • 3
1
vote
1 answer

Would Hashing a Decryption Key Significantly Lower Security?

I'm using the Haskell Codec.Crypto.SimpleAES package to create a crude password manager. The password manager seems secure but it's unable to warn the user when the decryption key is invalid. If a user supplies a bad decryption key, the program…
Shawn Eary
  • 113
  • 5
1
vote
1 answer

Estimating Password Cracking Speed Based on GPU?

I was wondering if there was a calculator or formula I could use to find a rough estimation of the time it takes to crack hashes based on GPU. I am trying to assess how much performance I would lose/gain based on different build cases. Specifically,…
Ryan
  • 11
  • 1
  • 2
1
vote
2 answers

Should Google User ID's be hashed when stored in the database

I'm currently developing an auth backend that allows for both Google and Email/Password as authentication methods. I'm basically treating the Google ID and Password as credentials here. I'm already one-way hashing passwords but I'm not sure if I…
cuuupid
  • 119
  • 2
1
vote
2 answers

Can a document be digitally signed multiple times, successively by different users?

The question is, if a document that is collaboratively edited, one user per time, could be digitally signed by every editor before it is passed to the next editor. And if yes, could the final receiver use the public keys of every editor in reverse…
user209758
1
vote
3 answers

Disguising the type of hash used

I've read about why MD5, SHA1, and many other hashing functions are insecure, by a lot, but I'm thinking of doing a different approach. It won't increase security, I'm aware of that, but I believe it can make cracking the hash much more…
das
  • 137
  • 4
1
vote
0 answers

Manipulation-save logging

I have to keep a journal of all transactions that are performed in my application. Think of an invoice journal. What options do I have? E.g. an option in syslogd, or a table configuration in MySQL would be great. My goal is to at least be able to…
olidem
  • 111
  • 2
1
vote
3 answers

Which function to hash 128 bit API key with?

I'm generating 128 bit API keys. AFAIK 128 is totally secure for generated key. In the DB I want to store hashes, not the plain text (to be protected against DB leak), but what hashing algorithm should I use? MD5 and SHA-1 are not considered secure.…
piotrek
  • 269
  • 1
  • 8
1
vote
2 answers

Token-based group invitation link

I've searched this site and the web for an answer to this question, but haven't found what I'm looking for, so here goes. Pointers to existing relevant answers are much welcome as well. I'm building a web app where users can be in private groups. In…
Markus
  • 131
  • 4
1
vote
1 answer

WebGoat 8: JWT Tokens Lesson 5 using hashcat to crack signature

I cracked the hash, and I got…
1
vote
1 answer

Using BITMAIN AntMiner L3+ for cracking password

I want to use a BITMAIN AntMiner L3+ miner to crack passwords. How can I do that? Can I install hashcat agent to L3+ ?
Mr.mb
  • 11
  • 2
1
vote
1 answer

How to dynamically generate the hash value of a file while it gets downloaded from any website?

I've tried generating the hash value of a file that is trying to get downloaded and compared it against the list of hash values, and if there is a match then it doesn't get downloaded.Here i have manually given the details of websites url and the…
1
vote
2 answers

PHP password_hash (bcrypt) vs sha-3

password_hash() is the recommended function in PHP to generate password hashes. The standard usage is password_hash($password, PASSWORD_DEFAULT); and default hash with PASSWORD_DEFAULT is bcrypt. The benefit is using the built-in password_verify()…
Anna Völkl
  • 253
  • 2
  • 7