Hash

How does Linux Calculate the SHA1 Hash of a File?
How does Linux Calculate the SHA1 Hash of a File?
Learn how Linux calculates the SHA1 hash of a file and the importance of file hashing for data integrity and security purposes.
How many characters are produced for each hash?
How many characters are produced for each hash?
This article explains how hash functions like MD5, SHA-1 and SHA-256 produce hashes with fixed number of characters based on their bit lengths.
Is storing of passwords in sha-1 hashing secure?
Is storing of passwords in sha-1 hashing secure?
Examines if SHA-1 hashing is still secure for password storage given new vulnerabilities, and discusses stronger alternatives like bcrypt and best practices.
Why does Bitcoin use two rounds of SHA-256?
Why does Bitcoin use two rounds of SHA-256?
Explains Bitcoin's use of double SHA-256 hashing, and how two rounds of SHA-256 enhances protection against pre-image attacks and collision attacks.
Why was LinkedIn using unsalted SHA-1 to hash passwords?
Why was LinkedIn using unsalted SHA-1 to hash passwords?
This article examines why LinkedIn used insecure unsalted SHA-1 for password hashing, the risks it posed, LinkedIn's response, and lessons learned.
What's the most known/popular hashing algorithm?
What's the most known/popular hashing algorithm?
Compares popular hashing algorithms like MD5, SHA-1, SHA-256, bcrypt and scrypt. It explains SHA-256 is currently the most widely used secure algorithm.
What is a brute force attack on a cryptographic hash function?
What is a brute force attack on a cryptographic hash function?
This article explains brute force attacks on cryptographic hashes - how they work, associated risks, prevention measures, and real-world examples.
What is the Most Secure Hash Right Now?
What is the Most Secure Hash Right Now?
Provides an overview of popular hash algorithms like MD5, SHA-1, SHA-256, and discusses why SHA-3 is currently the most secure cryptographic hash function.
Where do the beginning of most SHA hashes fall?
Where do the beginning of most SHA hashes fall?
Explore the probability distribution of the beginning bits in SHA hashes and understand its implications in cryptography and security measures.