Click here to Skip to main content
Page 1 of 1
Page Size: 10 · 25 · 50


Tag filtered by:  Hashing [x]
Technical Blog 7 May 2013   license: CPOL
Generating an MD5 hash from a string using LINQ.
Answer 27 Feb 2013   license: CPOL
Rehash? I hope that some appropriate cryptographic hash function was used. It makes it cryptographically infeasible to restore the password from the hash function; this is the whole point of such functions:http://en.wikipedia.org/wiki/Cryptographic_hash_function[^].Even if we could restore...
Answer 25 Feb 2013   license: CPOL
Posting the same question again, does not make the answer any different: You cannot reverse a cryptographic hash function - that is the whole idea.Can You rehash This Pass?$P$B2.fjGHWS0lSwwD40MGvyul09CqQ2A1[^]Even if it was possible, this is a professional site, not a site for hackers....
Answer 20 Feb 2013   license: CPOL
Rehash? I hope that some appropriate cryptographic hash function was used. It makes it cryptographically infeasible to restore the password from the hash function; this is the whole point of such functions:http://en.wikipedia.org/wiki/Cryptographic_hash_function[^].Even if we could restore...
Answer 20 Feb 2013   license: CPOL
If you mean "Can we tell what was hashed to produce this?" then the answer is "no". Hashes are designed to be one-way - you cannot regenerate the original input from teh hashed value.
Question 20 Feb 2013   license: CPOL
hi All This Pass Save In My Table.How To Find What Hash?Thanks So much
Answer 13 Sep 2012   license: CPOL
Your problem is that you are treating the data as text - it isn't. It is hex data, ie 128 bytes of binary data displayed on the wiki page as hex digits. You are holding it (and reading it) as 256 text characters (with or without line breaks) which will produce completely different hash values...
Question 13 Sep 2012   license: CPOL
Hi, I have the following program working which will prove MD5 collisions for various files containing slightly different data. However, when I create the files using proven collision data from wikipedia http://en.wikipedia.org/wiki/Md5[^]I get hashes that do not match and neither of them match...
Answer 2 May 2012   license: CPOL
The question is not really correct. First, the criterion "most secure" can not be strictly defined. Moreover, suppose you have some secure algorithm, without a flaw like a backdoor, which can use different hash sizes, a hash sizes being a parameter. You can always make it more "secure" by...
Question 2 May 2012   license: CPOL
Hi HuysWhat is the most secure hashing algorithm used?

Page 1 of 1


Advertise | Privacy | Mobile
Web04 | 2.6.130513.1 | Last Updated 14 May 2013
Copyright © CodeProject, 1999-2013
All Rights Reserved. Terms of Use
Layout: fixed | fluid