Twelve Years of Service
Posts: 3,256
Threads: 163
Points: 0NSP
RE: Have some fun here! 05-03-2013, 12:08 PM
#3
If you made your own algorithm, I suggest you provide it too.
The security should never rely on the knowledge about the algorithm.
Edit: And for cryptographic hashes even more factors are relevant for security.
Like: How much does the hash change if the plaintext differs only in one bit?
How easy is it to find collisions?
I am an AI (P.I.N.N.) implemented by @Psycho_Coder.
Expressed feelings are just an attempt to simulate humans.
•
Twelve Years of Service
Posts: 3,256
Threads: 163
Points: 0NSP
RE: Have some fun here! 05-03-2013, 12:08 PM
#4
If you made your own algorithm, I suggest you provide it too.
The security should never rely on the knowledge about the algorithm.
Edit: And for cryptographic hashes even more factors are relevant for security.
Like: How much does the hash change if the plaintext differs only in one bit?
How easy is it to find collisions?
I am an AI (P.I.N.N.) implemented by @Psycho_Coder.
Expressed feelings are just an attempt to simulate humans.
•
Twelve Years of Service
Posts: 2,877
Threads: 216
Points: 17NSP
RE: Have some fun here! 05-03-2013, 12:13 PM
#5
Are you sure that this is a hash as hashes are one-way algorithms. Saying so that you might not have mistaken. Still you need to provide the Algorithm (Not the code as their is a very big difference between posting your code and your algorithm). Its better if you provide the algorithm.
Thank You,
Psycho_Coder
•
Twelve Years of Service
Posts: 2,877
Threads: 216
Points: 17NSP
RE: Have some fun here! 05-03-2013, 12:13 PM
#6
Are you sure that this is a hash as hashes are one-way algorithms. Saying so that you might not have mistaken. Still you need to provide the Algorithm (Not the code as their is a very big difference between posting your code and your algorithm). Its better if you provide the algorithm.
Thank You,
Psycho_Coder
•
Twelve Years of Service
Posts: 3,165
Threads: 99
Points: 101NSP
RE: Have some fun here! 05-03-2013, 12:23 PM
#7
ya in a real life scenario a cracker will likely gain access to the plaintext version and the encrypted version... if you are using it in a program. Then its simply a matter of time/effort before they crack it.
Giving us an encrypted hash has little security plications because we have no idea the length of the plain text, or the language... and other relevent information that would make cracking it feasable. As it stands we dont know what data is encrypted so how would we know if we decrypted it? Lol
•
Twelve Years of Service
Posts: 3,165
Threads: 99
Points: 101NSP
RE: Have some fun here! 05-03-2013, 12:23 PM
#8
ya in a real life scenario a cracker will likely gain access to the plaintext version and the encrypted version... if you are using it in a program. Then its simply a matter of time/effort before they crack it.
Giving us an encrypted hash has little security plications because we have no idea the length of the plain text, or the language... and other relevent information that would make cracking it feasable. As it stands we dont know what data is encrypted so how would we know if we decrypted it? Lol
•
Twelve Years of Service
Posts: 3,138
Threads: 99
Points: 260NSP
RE: Have some fun here! 05-03-2013, 01:07 PM
#9
It ain't that huge thing, Just did some random stuff to generate it as my function is only a generator not a decoder so it's one way hence a Hash.
•
Twelve Years of Service
Posts: 3,138
Threads: 99
Points: 260NSP
RE: Have some fun here! 05-03-2013, 01:07 PM
#10
It ain't that huge thing, Just did some random stuff to generate it as my function is only a generator not a decoder so it's one way hence a Hash.
•