Jump to content

Talk:Cryptographic hash function

Page contents not supported in other languages.
From Simple English Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Hash Function Lounge -

The Hash function lounge – a list of hash functions and known attacks - this reference is no longer valid.— This unsigned comment was added by 205.228.82.171 (talk • changes) at 10:13, 30 October 2015‎.

Thank you for noticing. Luckily, I was able to find a link for where it had moved. It is updated. All the best, Fylbecatulous talk 13:13, 30 October 2015 (UTC)[reply]

The first characteristic listed ("It is extremely easy to calculate a hash for any given data") is not necessarily true. Some hash functions are deliberately designed to be expensive to compute, to thwart attackers attempting a brute force search for a collision. scrypt is one such algorithm. Kjkrum (talk) 09:25, 25 February 2016 (UTC)[reply]