Articles by Tag #hashing

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Password Hashing and Data Integrity in Real-World Implementation

When a user creates a new account by signing up, the password they provide is not stored directly in...

Learn More 20 1Jan 25

Hashing

যখন আপনি কোনো ওয়েবসাইটে নতুন অ্যাকাউন্ট খোলার কথা ভাবেন, তখন আপনাকে ইমেল প্রদান করতে হয় এবং একটি...

Learn More 20 0Jan 23

Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

Hey Developers, 👋 when building a scalable application, having a secure authentication system is a...

Learn More 11 2Aug 9 '24

What the Hash?! Understanding the Basics of Hashing

Hashing is an important concept that helps us organize and manage data more efficiently. It's like a...

Learn More 10 0May 4

The Bcrypt Algorithm for Secure Password Hashing

Hashing is a cryptographic function that cannot be reversed. It takes an input of random size to...

Learn More 5 0Dec 8 '24

Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash is a robust module designed for securely hashing passwords using the Bcrypt algorithm....

Learn More 4 0Nov 4 '24

Difference Between Encryption and Hashing 🔐🔑

Table of Contents Introduction Understanding Encryption Understanding Hashing Key...

Learn More 2 0Nov 8 '24

🚀 Introducing HashX – The Lightweight & Fast Hashing Library! 🔥

Hey Developers! 👋 I just launched HashX, an open-source hashing library that makes secure hashing...

Learn More 1 0Mar 26

Cuckoo Hashing: An Efficient Collision Resolution Technique with O(1) Lookup Time

Overview Cuckoo Hashing is an advanced technique used to resolve hash collisions...

Learn More 1 1Feb 25

Distributed Hash Generation Algorithm in Python — Twitter Snowflake Approach

Into The Background… In any software development lifecycle, unique IDs play a major role...

Learn More 1 0Jul 3 '24

The Science of Password Protection: Understanding Hashing, Salting, and the Future of Authentication

Passwords remain the primary keys to our online identities despite their well-documented...

Learn More 0 0May 15

Comparative Analysis of Password Hashing Algorithms: Argon2, bcrypt, scrypt, and PBKDF2

In cryptography and cybersecurity, choosing a password hashing algorithm is crucial for protecting...

Learn More 0 0Oct 1 '24

How to Prove Future Claims: A Guide to Cryptographic Foreshadowing

A user on Hacker News posed an intriguing question: how can one foreshadow specific information and...

Learn More 0 0May 26

The Evolution of Hashing Algorithms: From MD5 to Modern Day

The journey of cryptographic hash functions mirrors the evolution of digital security itself. From...

Learn More 0 0Dec 9 '24

What is Hashing? A Complete Guide for Developers and Security Professionals

Table of Contents Introduction Core Concepts Properties of Hash Functions How Hashing...

Learn More 0 0Dec 9 '24

Sorting Algorithms That Use Hash Tables

The process of sorting is an essential undertaking in the field of computer science. Over...

Learn More 0 0Dec 7 '24

How does BCrypt Verification work?

Have you ever wondered how can hashing algorithm verifies? Before we going into that, we have to...

Learn More 0 0Mar 20

Why Laravel’s bcrypt Hashes Fail in Node.js and How to Fix It

Introduction When integrating a new Node.js authentication service with an existing...

Learn More 0 2Jun 8

Lithe Hash: Um Módulo Robusto para Hashing Seguro de Senhas

O Lithe Hash é um módulo robusto projetado para hashing seguro de senhas utilizando o algoritmo...

Learn More 0 0Nov 4 '24

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

As online threats keep evolving, storing passwords securely has become a constant challenge for...

Learn More 0 0Oct 31 '24

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Data security is a top priority for businesses and individuals alike. With cyber threats evolving,...

Learn More 0 0Nov 2 '24

Basic File Integrity Monitoring System

Git Repo : Git repo of File integrity monitoring system This Python-based system monitors assigned...

Learn More 0 0Oct 8 '24

Pattern 9: Hashing

List of problems I have solved so far Easy Medium Hard List of problems I have...

Learn More 0 0Dec 14 '24