Top "Hash" questions

A hash function is any well-defined procedure or mathematical function that converts a large amount of data into a small datum, usually a single integer.

How long to brute force a salted SHA-512 hash? (salt provided)

Here is an algorithm in Java: public String getHash(String password, String salt) throws Exception { String input = password + salt; MessageDigest …

hash cryptography salt brute-force sha
Why should hash functions use a prime number modulus?

A long time ago, I bought a data structures book off the bargain table for $1.25. In it, the explanation for …

language-agnostic data-structures hash
How can I sort a Perl hash on values and order the keys correspondingly (in two arrays maybe)?

In Perl, I want to sort the keys of a hash by value, numerically: { five => 5 ten => 10 one => 1 …

perl sorting hash perl-hash
Java calculate hex representation of a SHA-1 digest of a String

I'm storing the user password on the db as a sha1 hash. Unfortunately I'm getting strange answers. I'm storing the …

java hash sha1
Meaning of Open hashing and Closed hashing

Open Hashing (Separate Chaining): In open hashing, keys are stored in linked lists attached to cells of a hash table. …

hash
How to get the first key and value pair from a hash table in Ruby

I'm trying to get the first key and value key from a hash table in ruby. I don't know the …

ruby hash
Accessing elements of nested hashes in ruby

I'm working a little utility written in ruby that makes extensive use of nested hashes. Currently, I'm checking access to …

ruby hash hash-of-hashes
How to hash a password with SHA-512 in Java?

I've been investigating a bit about Java String encryption techniques and unfortunately I haven't find any good tutorial how to …

java security hash passwords sha512
Ruby - getting value of hash

I have a hash like {:key1 => "value1", :key2 => "value2"} And I have a variable k which will have …

ruby hash key-value
When is CRC more appropriate to use than MD5/SHA1?

When is it appropriate to use CRC for error detection versus more modern hashing functions such as MD5 or SHA1? …

hash embedded crc