Category "hash"

Is there a Raku method that allows a hash value to be sorted and split from its pair?

I am currently trying to use hashes in an array to find the keys and values of each specific item in the array. I am able to do this and both the keys and the v

Initialize a Merkle tree of 8 with blank leaves in solidity

I am trying to initialise an empty merkle tree in the constructor my solidity contract I have a merkle tree of 8 leaves, so that means that the flattened out fo

Return Elements in the array that start with a specific letter e.g D

I am having issue with my code below. I am new to ruby. I want to return names that only start with the letter D but it just returns all the names. When I try t

How do I find Hash type If I know INPUT an OUTPUT

I have an encrypted hash and I don't know the HASH TYPE. I have 2 alternatives, one of them is surely correct (matches INPUT with OUTPUT). How can I find the ha

The matching algorithm for hashing passwords

So my question is : How does hashing algorithms actually check if passwords match because they generate a new password every time. Let's suppose I have a passwo

Can keys or hashes trigger an injection attack?

Can hashes or keys generated (either intentionally or accidentally) that would trigger an injection attack? For example, if the hash or key was generated as som

Why MongoDB saves Hash value in different format?

I am learning IPFS and trying to save IPFS file info in MongoDB. After uploading, I get one hash value ex: {fileHash: CID(QmbCaWPi9tSqcnykvBUMaH2M1d5PiVPLEfPwhJ

SHA-256 by hand, calculating the SHA-256 initial words

I am reading the publication FIPS 180-4 and trying to implement SHA-256 on my own. On the page 15, title 5.3.3 SHA-256 we have an initialization of initial hash

Merkle Proof in python using Keccak256

I'm trying to create a whitelist for an NFT using a Merkle tree to save on gas costs. I saw a great implementation here, in javascript, but I would like to do

What is an example of an "order preserving hash function"

I am now learning about hash ordering of file records, there is an issue with "ordered" accessing of the hash key which is being ineffective and thus we are enf

Hashing gives different result

I am using Python and MySql to handle user authentication. I have added the users thru python with the exact same method, but when I try to do the "login"/authe

Same password hash not matching

I am trying to create and test my api for login using C#. Below is the major part of the code: private static void CreatePasswordHash(string password, out byte[

How to convert a hash string to an integer in Snowflake?

I'm trying to get a hash of a decimal value and convert it to an integer. But the query results in the following error: Numeric value 'b902cc4550838229a710bfec4

how to store additional data in a text file apart from it's content - C++

I am doing this small university project, where I have to create a console-based text editor with some features, and making files password protected is one of t

MYSQL and Python: Add salt after the first two characters of the password

I am working in MYSQL and Python. I have a table that stores users login information and want to make this secure. How do I add the salt after the first two cha

What is the meaning of hash symbol followed by number after IP address when I use nslookup?

When I type command: $ nslookup www.google.com The results are: Server: XXX.XXX.XX.X Address: XXX.XXX.XX.X#NN Non-authoritative answer: ...

My password_verify for a value from database always return false

include("src/database.php");#this included file works wll $query=mysqli_query($conn,"SELECT * FROM students limit 1"); $data=mysqli_fetch_assoc($query); echo "m

Bouncycastle how to envelop the signed digest it in the original document with java?

In connection with this issue: https://github.com/bcgit/bc-java/issues/1021 I am looking for the best method to envelope the signed hash of a document inside th

invoking a stored procedure with input parameter and out cursor in perl script

Trying to execute a procedure in perl script, Proceure ->create or replace PROCEDURE Getproc ( v_catg IN CHAR DEFAULT NULL, v_cursor OUT SYS_REFCURS

How does bcrypt "know" whether a given hash is associated with a given password?

Given a password P and hash H, the function bcrypt.compare(P, H) tells you whether or not H is a bcrypt hash of P. Question: How does bcrypt.compare do the abov