Questions tagged as 'hash'

2
answers

What is HMAC?

When working on a project that uses sha256 and security keys, I came across the term hmac . I still do not really know what it's all about, and I'd like to understand a bit more. I have the following questions: What would an HM...
asked by 14.03.2017 / 17:40
2
answers

Choosing the method for hashing in PHP

My question began when I decided to re-examine the method I was using to obtain the user's password and store it in the database. After reading this , this and this question here on the net, plus many others on other networks, such as this...
asked by 08.08.2016 / 19:40
1
answer

How to Use Salts and Hashes with PHP?

Next, I have to make a user registration and login system, but I wanted to increase the security of this system using salts in passwords, could someone show me a simple example of this?     
asked by 14.02.2014 / 01:35
2
answers

Trigger an action when a given hash is found in the URL

The idea is to start an animation when a given hash is found in the URL. Example Taking the example of a page whose navigation works by hash: <nav> <ul> <li><a href="#john">John</a></li> &l...
asked by 15.01.2014 / 02:46
3
answers

How do they relate to 'hash' which is the so-called 'dictionary' of python with the 'hash' function of encryption?

I would like to understand how the 'hash' function of encryption (in which you encrypt for example passwords) is related, with the hash key-value in programming (also known as 'dictionary' in Python for example).     
asked by 21.02.2017 / 02:30
1
answer

Can MD5 hash be repeated for different passwords causing collision?

A co-worker made a Java system that encounters collisions in a series of hash MD5. But he did not stop to analyze the results, made only an assertion that they exist. But I would like to take this away from the proof, does anyone know of the...
asked by 19.11.2015 / 14:01
3
answers

How to generate a hash on the client side?

I am researching ways to create a login system with a secure encryption that does not weigh to the server. Home Taking the example this answer I'm looking for a way to do client-side encryption, thus sending the password already encrypted for...
asked by 20.02.2015 / 16:52
2
answers

Is it efficient to check file modifications for Hash?

Scenery I need to implement a file change check between 2 points of my application. * ¹ Point 1 - Server - I have a folder where are some product images; Point 2 - Mobile Device - I have a catalog application that downloads these imag...
asked by 11.06.2014 / 15:59
4
answers

Generate sequential IDs without losing the sequence

By Identity do not want to, because it breaks the sequence if something happens. Max() + 1 , I find it very vulnerable and slow when I have many records. So I ask, is there a way that someone knows, that I can generate sequential n...
asked by 05.06.2014 / 20:33
0
answers

How exactly SHA-256 algorithm works [closed]

I did a search on the internet, but the results on the operation of the SHA-256 algorithm did not satisfy me, if anyone can help me I'll be grateful. Vlw.     
asked by 11.11.2015 / 12:11