Enter RMH. RMH does mathematical and string operations on the entered text. Then it gives a 30 character long string, 0-9,a-z,A-Z (base 62). This is 6230 (5.9122213e+53) permutations! That's 5.9122067e+53 more than SHA1!
The RMH algorithm isn't stable enough yet to be used for real purposes, but my hopes are that it will be!
One plus bits have over strings is that the hash will also work on files.
What is a hash?
A hash is a non-reversible encryption. This means, it turns plain text into gibberish, and you should not be able to figure out the original text. This is different from encoding, where you are meant to reverse it.What's the use of encrypting something so that it can never be read? To store passwords securely in a database, for one. Example:
Website A and website B each have a user account system. Website A hashes their users' passwords in the database, while B doesn't. Hackers steal both website's databases. Now, they can get at anyone's account on B, because the passwords are plain in there. But for A, they can't.
To log in the user, sites simply check the hashed input against the value in their database.
If you're hashing files, it's usually to create a digital signature. So, when you download a program, you can check the hash you get from it against the official hash, to make sure your program wasn't pirated.
No comments:
Post a Comment