Questions tagged [sha2]
SHA2 is a family of cryptographic hash algorithms, including SHA256 and SHA512. These are the successor to the SHA1 algorithm.
44 questions
0 votes
2 answers
1k views
Why AES256 with SHA384 in TLS [closed]
Is there any concrete/solid rationale for this choice of cipher? Seems to be the default when I connect via TLS1.2 to an Apache2 server (whatever latest version on Debian 11) with configuration lines ...
18 votes
3 answers
21k views
Argon2 vs SHA-512, what's better in my case?
First I am very bad in cryptographic algorithms. I found online that Argon2 is more secure than SHA-512, so I used it for password hashing. There're recommended options for Argon2: Memory: 4Gb ...
4 votes
0 answers
200 views
I/O cost and dedicated hashing hardware/ SHA2/ PBKDF2
Is there existing work (or algorithms) that explore (or exploit) imposing an i/o cost to disadvantage hashing hardware, while still using SHA2-family of hashes? Is this even possible, or would any ...
3 votes
0 answers
719 views
Add additional rounds on existing SHA-512 salted hashes without knowing clear text password?
Assuming you have a salted SHA-512 password hash with 5000 rounds. For example: {CRYPT}$6$rounds=5000$6835c5dcf0bb7310$hVod/jy7uONMSa.FVpLHb/2OrWpAj3lB/....
0 votes
3 answers
991 views
Is it possible to build a partial search mechanism on hashed values? [closed]
I am hashing some sensitive values to support search mechanism as decrypting the values at run-time would be time consuming. I'm using SHA-512 with salt. For now, things look good. I have the hashes ...
0 votes
1 answer
369 views
A Method for Generating Un-Guessable Client Identifiers
I am implementing an OAuth 2.0 authorisation server. As part of client registration process I want to generate the unique client identifier for this client. The method I have chosen is to take all ...
3 votes
2 answers
701 views
Is there a cryptographic disadvantage to applying bcrypt to an already hashed password
I originally asked this on stackoverflow, but due to lack of traction and a recommendation by a user there I have asked it here too. Imagine a scenario where a client application is sending a ...
1 vote
0 answers
368 views
How Secure Would Client Side Sha-512 Be In JavaScript
I've created an Capture The Flag challenge for me and a few of my mates, and for the final challenge, you're goal is to log in as admin to a site. Now the site doesn't use any server side languages (...
2 votes
3 answers
326 views
Are Salt strings stored by application? [duplicate]
1) As storing passwords in plain text in databases are not secure and so is not a good practice. password stored in db = "abcde" (plain text) 2) To avoid this, passwords are stored after being hashed ...
0 votes
1 answer
819 views
Is it safe to use SHA-512 to identify credit card?
I am thinking if using one-way function like SHA-512 is considered to be safe for application on credit card numbers. The credit card number is 13-19 number with known BIN range (6-8 numbers) and the ...
2 votes
0 answers
37 views
SHA 1 Interemediate Signer for a SHA2 Personal Certificate [duplicate]
I came across a certificate that has a signer that is SHA1 but it is a SHA2 certificate. Is this actually allowed or is did the CA screw up ? Would it work with a TLS 1.2 negotiation?
0 votes
2 answers
418 views
Does flagging a file as read-only prevent a hash from changing?
Some time ago I developed a simple script to detect duplicated files. It works in the following way: Locates Excel files in a folder. Obtains SHA-256 of the file. Stores a mapping between Filename - ...
2 votes
3 answers
7k views
Rounds in a hashing function
First of all, Hello! I'm new to the site, don't know any english equivalent to "yoroshiku". So, I was reading the SHA-512crypt generator documentation and found the part: The default number of ...
1 vote
1 answer
292 views
Extra PBKDF2 characters in SHA-512 output
I was using hash_pbkdf2 earlier today when I noticed something strange. The normal way to generate a hash is to output the entire string like the code below which outputs a 128 character string (128 ...
0 votes
1 answer
294 views
Finding SHA-2 collision
What would be the implications if finding a collision in the SHA-2 hash function? Would there be a greater impact if more than one were found, or would it be the same in principal?