Category "hash"

SHA-256 by hand, calculating the SHA-256 initial words

I am reading the publication FIPS 180-4 and trying to implement SHA-256 on my own. On the page 15, title 5.3.3 SHA-256 we have an initialization of initial hash

Merkle Proof in python using Keccak256

I'm trying to create a whitelist for an NFT using a Merkle tree to save on gas costs. I saw a great implementation here, in javascript, but I would like to do

What is an example of an "order preserving hash function"

I am now learning about hash ordering of file records, there is an issue with "ordered" accessing of the hash key which is being ineffective and thus we are enf

Hashing gives different result

I am using Python and MySql to handle user authentication. I have added the users thru python with the exact same method, but when I try to do the "login"/authe

Same password hash not matching

I am trying to create and test my api for login using C#. Below is the major part of the code: private static void CreatePasswordHash(string password, out byte[

How to convert a hash string to an integer in Snowflake?

I'm trying to get a hash of a decimal value and convert it to an integer. But the query results in the following error: Numeric value 'b902cc4550838229a710bfec4

how to store additional data in a text file apart from it's content - C++

I am doing this small university project, where I have to create a console-based text editor with some features, and making files password protected is one of t

MYSQL and Python: Add salt after the first two characters of the password

I am working in MYSQL and Python. I have a table that stores users login information and want to make this secure. How do I add the salt after the first two cha

What is the meaning of hash symbol followed by number after IP address when I use nslookup?

When I type command: $ nslookup www.google.com The results are: Server: XXX.XXX.XX.X Address: XXX.XXX.XX.X#NN Non-authoritative answer: ...

My password_verify for a value from database always return false

include("src/database.php");#this included file works wll $query=mysqli_query($conn,"SELECT * FROM students limit 1"); $data=mysqli_fetch_assoc($query); echo "m

Bouncycastle how to envelop the signed digest it in the original document with java?

In connection with this issue: https://github.com/bcgit/bc-java/issues/1021 I am looking for the best method to envelope the signed hash of a document inside th

invoking a stored procedure with input parameter and out cursor in perl script

Trying to execute a procedure in perl script, Proceure ->create or replace PROCEDURE Getproc ( v_catg IN CHAR DEFAULT NULL, v_cursor OUT SYS_REFCURS

How does bcrypt "know" whether a given hash is associated with a given password?

Given a password P and hash H, the function bcrypt.compare(P, H) tells you whether or not H is a bcrypt hash of P. Question: How does bcrypt.compare do the abov

How to directly assign the SOLE hash key to a scalar in perl

Is it possible to assign the only existing hash key directly to a scalar? For example can these two statements be combined into one? @the_keys = keys %the_hash;

Custom Hashing Algorithm

Out of sheer boredom, I decided to write a hashing algorithm in python. It all works, however I've got a couple problems: Results are similar (e.g. hash(1234)

How to disable laravel 5.2 password bcrypt

I want to disable the laravel password bcrypt when I try to log-in like this Auth::guard('client')->attempt( 'id' => $request['id'], 'password' => $re

How can I compare a file's SHA256 hash in PowerShell to a known value?

If I've downloaded a file with a known SHA256 hash, how can I use PowerShell to check that the file matches the expected hash?

(Python) Hash function returns different values depending on how the script is called (cmd vs IDE)

I have a script that scrapes cell value data from an excel workbook into nested tuples. Then it returns the hash of that tuple. I can run it in my IDE (Spyder

Is there a way to hash a command output without the use of a temp file?

In command-prompt you can see the md5 or other hash of a file using certutil -hashfile <filepath> <hash algorithm>. This was the only option I can f

How was the initial hash value (H(0)) of SHA-224 obtained?

RFC 6234: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) explains only how the initial hash values (H(0)) for SHA-256, SHA-384, and SHA-512 were ob