Hashing algorithms, specifically cryptographic hashing function. They take some value as input and return a hash value. They are different from the regular hashing function in the sense that different input values are not supposed to map to the same output, i.e. no collisions.
MD5 and SHA2 are usually being compared together. MD5 has some security vulnerability — someone may hack it and make it return the same hash value for different input values. SHA2 actually represents a group of hashing algorithms (SHA-256 etc.) that return outputs with different number of bits. SHA2 is more secure than MD5, but it (SHA-256) is less efficient because MD5’s output is only 128 bits. SHA-1 and MD4 come from an earlier generation.
Perform some bit manipulations over the input.
Working at a company with a fairly strong culture rooted in engineering, I (passively) participated when my colleagues chitchatting about various pieces of technology that I don’t necessary understand or even have heard of. It seems interesting to learn about what they are talking about, so I’m motivating myself by starting a chit-chat series based on my daily observations.
Getting started …