Talk:Cryptographic hash function
|This is the talk page for discussing improvements to the Cryptographic hash function article.|
Hash Function Lounge -[change source]
The Hash function lounge – a list of hash functions and known attacks - this reference is no longer valid.— This unsigned comment was added by 184.108.40.206 (talk • changes) at 10:13, 30 October 2015.
- Thank you for noticing. Luckily, I was able to find a link for where it had moved. It is updated. All the best, Fylbecatulous talk 13:13, 30 October 2015 (UTC)
The first characteristic listed ("It is extremely easy to calculate a hash for any given data") is not necessarily true. Some hash functions are deliberately designed to be expensive to compute, to thwart attackers attempting a brute force search for a collision. scrypt is one such algorithm. Kjkrum (talk) 09:25, 25 February 2016 (UTC)