#hashing

Dawiscodawisco
2025-04-22
Joaquim Homrighausenjoho@mastodon.online
2025-01-30

I want to convert UTF-8 encoded strings into some sort of irreversible hash *and* maintain correct sort order (or the ability to lexically compare strings).

If I say "Order-Preserving Hashing with Prefix-Free Encoding", what do you say? 🤔

The problem I foresee (with great wisdom 👀) is dictionary attacks, thus not being actually "irreversible".

#programming #sorting #hashing #hash #code #coding

2025-01-15

Merkle-tree: Как проверить целостность данных без полного доступа?

Хэширование — простой и надёжный способ проверить целостность данных. Но как быть, если нужно удостовериться, что часть данных принадлежит определённому набору ? Например, проверить отдельную транзакцию в блоке Bitcoin или чанк файла в BitTorrent? Для этого используется уникальная структура данных — Merkle-tree . В этой статье вы узнаете, как с её помощью решать задачи проверки данных без доступа к их полному объёму.

habr.com/ru/articles/873718/

#merkleproof #merkle_tree #merkle_patricia_tree #blockchain #bitcoin #bittorrent #hash #hashing #distributed_systems #guide

2025-01-12

@spmatich @ibk @phoebematich

For medical records you can imagine we want to know, and show, that the record we see is the record that was made, all of it, and only it.

This may be accomplished by passing the (element of the) record through a #trapdoor #function, or #hashing #algorithm such as SHA1 (secure hash algorithm 1) and sending the hash somewhere else.

The hash is small, compared with the medical note, and tiny compared to a photograph.

2025-01-05
Tjald Hash and RNG Suite

A collection of hash and RNG functions that rely on hardware AES instructions.

https://github.com/NoHatCoder/Tjald-Hash-and-RNG-Suite

(found via the cryptography mailing list)

#Crypto #Cryptography #Cryptology #Hashing #Random #RNG

@crypto@a.gup.pe @cryptography@lemmy.ml @crypto@lemmy.world
Tao of Mactaoofmac
2025-01-02

Apple Photos phones home, but doesn't actually tell Apple anything about you

There’s witch hunts, and there’s discussions about online privacy.(...)

taoofmac.com/space/links/2025/

Apple Photos phones home, but doesn't actually tell Apple anything about you
2024-12-15

⚡️Turning my home into a mini crypto playground with Litecoin and Doge miners! Who else is mining for fun? ⛏️
#crypto #Litecoin #doge #hashing #funny

Picture of 2 working Litecoin minersPicture of 2 working Litecoin miners and their electrical supply.
mansi18mans18
2024-12-10

Demystifying data protection! Explore the key differences between Encryption, Encoding, Hashing, Tokenization, and Masking to secure your sensitive information.

Data privacy - infosectrain.com/data-privacy/

GripNewsGripNews
2024-11-18

🌘 ChibiHash:小型、快速的64位雜湊函式
➤ 適合非加密需求的小型快速雜湊函式
nrk.neocities.org/articles/chi
ChibiHash是一個小巧且快速的64位雜湊函式,具有良好的品質、可攜性和不涉及加密。該函式效能優異,適合處理大量字符串,是非加密64位雜湊需求的不錯選擇。
+ 新的雜湊函式看起來相當吸引人,尤其對於處理大量資料的需求。
+ 簡潔而高效的函式設計,對於一些特定應用場景可能會很有用。
#[ c ]

person 🧬🦠🧫👩‍💻cmkobel@genomic.social
2024-10-25

Saying that blockchains are inherently bad is like saying that knifes are inherently bad.
Yes, they can be used for bad things. But also good things: Just consider Torvald's Git software version control implementation.

#blockchain #hashing #git

Jan :rust: :ferris:janriemer@floss.social
2024-10-19

@liw Have a look at the "RustCrypto: #Password Hashes" project:

github.com/RustCrypto/password

They provide all kinds of password-hashing algorithms, like:
- Argon2
- PBKDF2
and many more

#Hashing #Rust #RustLang #Encryption

zirias (on snac)zirias@snac.bsd.cafe
2024-10-06
Just started work on the planned "single instance mode" for #Xmoji.

The first commit is done, adding a class implementing the core functionality using a local #Unix #socket. Part of the job is deriving a unique name for that socket, where #hashing comes natural.

I had a similar class in #qXmoji (based on #Qt), and there you have #sha256 at your fingertips with QCryptographicHash, so I just used that. You need a string from that, and sure thing, there's a .toBase64() method. Well, a / doesn't play well for filenames, but then, there's .replace().

Without all these helpers from Qt, first thing I did now was searching the web for a "good" hash function, but there's certainly no need for a cryptographic one. I found #FNV1a. It's super easy to implement in #C. And for the base64 part, well, doing it myself, I can directly use a modified set of digits, without the /.

Now, here's the whole thing:
https://github.com/Zirias/xmoji/commit/db764e3184537d42b528e718bd4886495eb45544

I'd say that's a nice example how not having lots of "powerful" library functions readily available can lead to a much better (smaller, more efficient) solution. 😏

#X11 #emoji #keyboard #development
2024-10-06

So ... due to an early obsession with historical BSD hashes ... I have significantly more bcrypt hashrate-per-watt cracking capacity than most solo shops. For bcrypt cost 12, it's about 34Kh/s straight wordlist -- the equivalent of about 17 4090s -- at only 1100W (these old Bitcoin FPGAs are very efficient for bcrypt specifically). And this capacity is intermittently idle, which is kinda a shame.

I haven't really put it out there as something I can help with if needed (outside of the Hashcat team). So ... feel free to ping me if you need bcrypts cracked/audited!

(Reasonable rates, but note that I do have a pretty firmly high bar for provenance / proof of authorization)

(Rat's nest of USB has been cleaned up a bit 😅)

#bcrypt #PasswordCracking #hashing

A stack of 36 ZTEX FPGA boards in a couple of acrylic CD towers, fed through a rat's nest of USB hubs. A box fan sits in front. A John the Ripper sticker graces the edge of the outer stack. Some heatsinks are copper-colored and less than an inch high; others are black and taller.
2024-09-19

Can somebody help me with this? 😂

While trying to do memory-hard hashing in #Bash without using external tools aside from #OpenSSL I came up with this thing: pastebin.com/D3vqgW7N
It seems to hash the password, but when using a fixed salt, the hash does not change, even with a different password.
Thus, I am not sure if this is trustworthy.

I'd be very glad if somebody could help me here 🙂

#hashing #cybersecurity

2024-09-17

'Random measure priors in Bayesian recovery from sketches', by Mario Beraha, Stefano Favaro, Matteo Sesia.

jmlr.org/papers/v25/23-1058.ht

#hashing #priors #prior

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst