Professional Documents
Culture Documents
Hashing algorithms are functions that generate a fixed-length result (the hash,
or hash value) from a given input. The hash value is a summary of the original
data.
What is hashing?
Hashing is a method of cryptography that converts any form of data
into a unique string of text. Any piece of data can be hashed, no
matter its size or type. I
Properties Hashing
The bad
Attackers equipped with fast hardware can easily “crack” hashed
credentials.
Good hash algorithms are designed to be collision-resistant, but
collisions are impossible to eliminate completely.
Rainbow tables are “optimized lookup tables” that can be used to
reverse-engineer one-way hash functions. A rainbow table is basically a
pre-computed set of plaintext strings and their corresponding hashes.
Large rainbow tables are publicly available, and attackers can use one
of these tables to retrieve cleartext data that has been hashed.