top | item 23952916

(no title)

Chickenosaurus | 5 years ago

If a cryptographic hash function is used, the security of this scheme doesn't rely on keeping the algorithm secret, though. Therefore, it's not security through obscurity. Of course, weaknesses could still exist (e. g. a too small input space because the ID that is hashed has too little entropy).

discuss

order

No comments yet.