Talk:Cryptographic hash function

Latest comment: 8 years ago by Kjkrum in topic Hash Function Lounge -

Hash Function Lounge - change

The Hash function lounge – a list of hash functions and known attacks - this reference is no longer valid.— This unsigned comment was added by 205.228.82.171 (talk • changes) at 10:13, 30 October 2015‎.

Thank you for noticing. Luckily, I was able to find a link for where it had moved. It is updated. All the best, Fylbecatulous talk 13:13, 30 October 2015 (UTC)Reply

The first characteristic listed ("It is extremely easy to calculate a hash for any given data") is not necessarily true. Some hash functions are deliberately designed to be expensive to compute, to thwart attackers attempting a brute force search for a collision. scrypt is one such algorithm. Kjkrum (talk) 09:25, 25 February 2016 (UTC)Reply

Return to "Cryptographic hash function" page.