Content deleted Content added
No edit summary |
Denisarona (talk | contribs) m Reverted edits by 103.206.105.66 (talk) to last version by Klbrain |
||
Line 1:
In [[cryptography]], [[cryptographic hash functions]] can be divided into two main categories. In the first category are those
In the second category are functions that are not based on mathematical problems but on an ad hoc basis, where the bits of the message are mixed to produce the hash. They are then believed to be hard to break, but no such formal proof is given. Almost all widely spread hash functions fall in this category. Some of these functions are already broken and are no longer in use.
|