User Tools

Site Tools


hashed

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
hashed [2025/05/20 12:25] – created userahashed [2025/05/20 12:38] (current) usera
Line 4: Line 4:
  
 The idea is that it should be relatively easy to apply the hash function, but impossible to do the reverse operation. It is used in many situations. On websites and applications, for example, your passwords are hashed before being stored, and when you enter a password, it is hashed and compared to the hash. This means that if the passwords are leaked, the hacker will only access hashes of passwords, and will still need to find which entry corresponds to it.  The idea is that it should be relatively easy to apply the hash function, but impossible to do the reverse operation. It is used in many situations. On websites and applications, for example, your passwords are hashed before being stored, and when you enter a password, it is hashed and compared to the hash. This means that if the passwords are leaked, the hacker will only access hashes of passwords, and will still need to find which entry corresponds to it. 
 +
 +you can see a popular hash function, SHA256, in action here: https://emn178.github.io/online-tools/sha256.html
 +Notice that if you change one character of the input, this changes radically the output. This is an important property of hash functions
 +
 +Keeping as an example the hash function SHA256, which will be the one you want almost all the time, to compute the hash function of a file, in Linux you can enter:
 +<code>
 +sha256sum [filename]
 +</code>
 +
 +on windows it would be:
 +<code>
 +certutil -hashfile [filename] SHA256
 +</code>
 +
 +and on MacOS:
 +<code>
 +shasum -a 256 [filename]
 +</code>
hashed.1747743922.txt.gz · Last modified: by usera