MD5 -, , SHA, PBKDF, bcrypt scrypt. scrypt. - , , . , , - .
:
1) - , h (m).
2) m -, -.
3) m1, m2 .
In addition, it is important to know that hash algorithms are publicly available, and it is very easy to calculate the hash value of a message. In addition, hashes are "one-way" functions, which means that it is difficult to find a message given the message hash. Actual security is thus based on this property.
source
share