Skip to main content

Questions tagged [sha2]

SHA2 is a family of cryptographic hash algorithms, including SHA256 and SHA512. These are the successor to the SHA1 algorithm.

0 votes
2 answers
1k views

Is there any concrete/solid rationale for this choice of cipher? Seems to be the default when I connect via TLS1.2 to an Apache2 server (whatever latest version on Debian 11) with configuration lines ...
Cal-linux's user avatar
  • 113
18 votes
3 answers
21k views

First I am very bad in cryptographic algorithms. I found online that Argon2 is more secure than SHA-512, so I used it for password hashing. There're recommended options for Argon2: Memory: 4Gb ...
Denis Steinman's user avatar
4 votes
0 answers
200 views

Is there existing work (or algorithms) that explore (or exploit) imposing an i/o cost to disadvantage hashing hardware, while still using SHA2-family of hashes? Is this even possible, or would any ...
brynk's user avatar
  • 1,140
3 votes
0 answers
719 views

Assuming you have a salted SHA-512 password hash with 5000 rounds. For example: {CRYPT}$6$rounds=5000$6835c5dcf0bb7310$hVod/jy7uONMSa.FVpLHb/2OrWpAj3lB/....
LuHa's user avatar
  • 41
0 votes
3 answers
991 views

I am hashing some sensitive values to support search mechanism as decrypting the values at run-time would be time consuming. I'm using SHA-512 with salt. For now, things look good. I have the hashes ...
Shwet Mahalgi's user avatar
0 votes
1 answer
369 views

I am implementing an OAuth 2.0 authorisation server. As part of client registration process I want to generate the unique client identifier for this client. The method I have chosen is to take all ...
user avatar
3 votes
2 answers
701 views

I originally asked this on stackoverflow, but due to lack of traction and a recommendation by a user there I have asked it here too. Imagine a scenario where a client application is sending a ...
David's user avatar
  • 177
1 vote
0 answers
368 views

I've created an Capture The Flag challenge for me and a few of my mates, and for the final challenge, you're goal is to log in as admin to a site. Now the site doesn't use any server side languages (...
The Gamer King's user avatar
2 votes
3 answers
326 views

1) As storing passwords in plain text in databases are not secure and so is not a good practice. password stored in db = "abcde" (plain text) 2) To avoid this, passwords are stored after being hashed ...
joven's user avatar
  • 151
0 votes
1 answer
819 views

I am thinking if using one-way function like SHA-512 is considered to be safe for application on credit card numbers. The credit card number is 13-19 number with known BIN range (6-8 numbers) and the ...
user1563721's user avatar
  • 1,129
2 votes
0 answers
37 views

I came across a certificate that has a signer that is SHA1 but it is a SHA2 certificate. Is this actually allowed or is did the CA screw up ? Would it work with a TLS 1.2 negotiation?
Thomas Cosenza's user avatar
0 votes
2 answers
418 views

Some time ago I developed a simple script to detect duplicated files. It works in the following way: Locates Excel files in a folder. Obtains SHA-256 of the file. Stores a mapping between Filename - ...
Jausk's user avatar
  • 209
2 votes
3 answers
7k views

First of all, Hello! I'm new to the site, don't know any english equivalent to "yoroshiku". So, I was reading the SHA-512crypt generator documentation and found the part: The default number of ...
WOkzinhan's user avatar
1 vote
1 answer
292 views

I was using hash_pbkdf2 earlier today when I noticed something strange. The normal way to generate a hash is to output the entire string like the code below which outputs a 128 character string (128 ...
Aedazan's user avatar
  • 134
0 votes
1 answer
294 views

What would be the implications if finding a collision in the SHA-2 hash function? Would there be a greater impact if more than one were found, or would it be the same in principal?
esote's user avatar
  • 373

15 30 50 per page