Skip to content

Commit

Permalink
Fix typos
Browse files Browse the repository at this point in the history
  • Loading branch information
paul-ion committed Jan 3, 2025
1 parent c510348 commit 647b83f
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion trainingportal/static/lessons/cryptoBreaker/crypto_hash.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ Most algorithms leverage the characteristics of the data to arrive at a unique v

##### Weaknesses

Digests can be pre-calculated making them as easy to reverse as an ASCII code. Indeed websites like `crackstation.net` or `hashes.com` contain large databases of pre-calculated digests also known as rainbow tables. The best way to prevent the reversing hashed words is to concatenate a random string to the text. This is known as adding a salt. Another mitigation involves hashing the message several times (adding iterations). This increases the ammount of computations necessary to compute the hash.
Digests can be pre-calculated making them as easy to reverse as an ASCII code. Indeed websites like `crackstation.net` or `hashes.com` contain large databases of pre-calculated digests also known as rainbow tables. The best way to prevent reversing hashed words is to concatenate a random string to the text. This is known as adding a salt. Another mitigation involves hashing the message several times (adding iterations). This increases the amount of computations necessary to calculate the hash.

Hashing algorithms are also vulnerable to collision attacks. Such attacks involve altering the input to arrive at the same digest. This is particularly dangerous when using hashing functions to ensure the integrity of executable files. Both MD5 and SHA1 algorithms are vulnerable to collision attacks.

Expand Down

0 comments on commit 647b83f

Please sign in to comment.