public marks

PUBLIC MARKS with tags sha1 & hash

2009

md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com

by CharlesNepote & 5 others, 2 comments
Moteur de recherche qui permet de retrouver des mots de passe hashés en md5 ou sha1.

2007

2006

MD5 Crack

by MageDealer
MD5 cracking site that uses Rainbow Tables and big dictionary search for md5 hash cracking

2005

Javascript md5 (and md4 and sha1)

by nhoizey & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md5 (and md4 and sha1)

by Krome & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md4, md5 and sha1 algorithms

by benoit & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

PUBLIC TAGS related to tag sha1

fc6 +   fedora +   hash +   security +   sha1sum +  

Active users

CharlesNepote
last mark : 14/05/2009 12:56

realmip
last mark : 29/01/2007 14:36

MageDealer
last mark : 10/11/2006 12:38

nhoizey
last mark : 03/02/2005 12:47

Krome
last mark : 03/02/2005 07:44

benoit
last mark : 03/02/2005 17:24