MS: This is no big deal
Hackers, 8 days later: Well, how about now?
#cybersecurity #ntlm #hashing #microsoft #cve #microsoft
https://www.theregister.com/2025/04/21/microsoft_apple_patch/
MS: This is no big deal
Hackers, 8 days later: Well, how about now?
#cybersecurity #ntlm #hashing #microsoft #cve #microsoft
https://www.theregister.com/2025/04/21/microsoft_apple_patch/
Consistent Hash Ring
https://gallery.selfboot.cn/en/algorithms/hashring
#HackerNews #Consistent #Hash #Ring #algorithms #distributed-systems #hashing #data-structures #tech-news
Fibonacci Hashing: The Optimization That the World Forgot
#HackerNews #FibonacciHashing #Optimization #Forgotten #Hashing #Algorithms #TechInnovation
Introducing MalChela. A YARA and Malware Analysis utility written in Rust. #DFIR #MalwareAnalysis #YARA #Hashing
I want to convert UTF-8 encoded strings into some sort of irreversible hash *and* maintain correct sort order (or the ability to lexically compare strings).
If I say "Order-Preserving Hashing with Prefix-Free Encoding", what do you say? 🤔
The problem I foresee (with great wisdom 👀) is dictionary attacks, thus not being actually "irreversible".
Merkle-tree: Как проверить целостность данных без полного доступа?
Хэширование — простой и надёжный способ проверить целостность данных. Но как быть, если нужно удостовериться, что часть данных принадлежит определённому набору ? Например, проверить отдельную транзакцию в блоке Bitcoin или чанк файла в BitTorrent? Для этого используется уникальная структура данных — Merkle-tree . В этой статье вы узнаете, как с её помощью решать задачи проверки данных без доступа к их полному объёму.
https://habr.com/ru/articles/873718/
#merkleproof #merkle_tree #merkle_patricia_tree #blockchain #bitcoin #bittorrent #hash #hashing #distributed_systems #guide
For medical records you can imagine we want to know, and show, that the record we see is the record that was made, all of it, and only it.
This may be accomplished by passing the (element of the) record through a #trapdoor #function, or #hashing #algorithm such as SHA1 (secure hash algorithm 1) and sending the hash somewhere else.
The hash is small, compared with the medical note, and tiny compared to a photograph.
…
Demystifying data protection! Explore the key differences between Encryption, Encoding, Hashing, Tokenization, and Masking to secure your sensitive information.
Data privacy - https://www.infosectrain.com/data-privacy/
#DataSecurity #Encryption #CyberSecurity #TechSimplified #Encoding #Hashing #Tokenization #Masking #infosectrain
Cryptography tutorial from the amazing Stephen Sims!
YouTube video: https://youtu.be/DjhJV_-mM5o
#vpn #hash #hashing #encryption #cyber #cybersecurity #infosec #infomationsecurity #aes #des #sha #md5 #ssl #ssh
🌘 ChibiHash:小型、快速的64位雜湊函式
➤ 適合非加密需求的小型快速雜湊函式
✤ https://nrk.neocities.org/articles/chibihash
ChibiHash是一個小巧且快速的64位雜湊函式,具有良好的品質、可攜性和不涉及加密。該函式效能優異,適合處理大量字符串,是非加密64位雜湊需求的不錯選擇。
+ 新的雜湊函式看起來相當吸引人,尤其對於處理大量資料的需求。
+ 簡潔而高效的函式設計,對於一些特定應用場景可能會很有用。
#[ c #hashing ]
Saying that blockchains are inherently bad is like saying that knifes are inherently bad.
Yes, they can be used for bad things. But also good things: Just consider Torvald's Git software version control implementation.
@liw Have a look at the "RustCrypto: #Password Hashes" project:
https://github.com/RustCrypto/password-hashes
They provide all kinds of password-hashing algorithms, like:
- Argon2
- PBKDF2
and many more
QCryptographicHash
, so I just used that. You need a string from that, and sure thing, there's a .toBase64()
method. Well, a /
doesn't play well for filenames, but then, there's .replace()
./
.So ... due to an early obsession with historical BSD hashes ... I have significantly more bcrypt hashrate-per-watt cracking capacity than most solo shops. For bcrypt cost 12, it's about 34Kh/s straight wordlist -- the equivalent of about 17 4090s -- at only 1100W (these old Bitcoin FPGAs are very efficient for bcrypt specifically). And this capacity is intermittently idle, which is kinda a shame.
I haven't really put it out there as something I can help with if needed (outside of the Hashcat team). So ... feel free to ping me if you need bcrypts cracked/audited!
(Reasonable rates, but note that I do have a pretty firmly high bar for provenance / proof of authorization)
(Rat's nest of USB has been cleaned up a bit 😅)
Can somebody help me with this? 😂
While trying to do memory-hard hashing in #Bash without using external tools aside from #OpenSSL I came up with this thing: https://pastebin.com/D3vqgW7N
It seems to hash the password, but when using a fixed salt, the hash does not change, even with a different password.
Thus, I am not sure if this is trustworthy.
I'd be very glad if somebody could help me here 🙂
'Random measure priors in Bayesian recovery from sketches', by Mario Beraha, Stefano Favaro, Matteo Sesia.
http://jmlr.org/papers/v25/23-1058.html
#hashing #priors #prior
CppCon 2024 SESSION ANNOUNCEMENT: So You Think You Can Hash by @ciura_victor
https://cppcon2024.sched.com/event/1gZfQ/so-you-think-you-can-hash
Register now: https://cppcon.org/registration/