{"id":5580,"date":"2010-05-24T03:00:47","date_gmt":"2010-05-24T08:00:47","guid":{"rendered":"http:\/\/blogs.scienceforums.net\/swansont\/?p=5580"},"modified":"2010-05-24T03:00:47","modified_gmt":"2010-05-24T08:00:47","slug":"mmmm-haaaash","status":"publish","type":"post","link":"http:\/\/blogs.scienceforums.net\/swansont\/archives\/5580","title":{"rendered":"Mmmm.  Haaaash."},"content":{"rendered":"<p><a href=\"http:\/\/scienceblogs.com\/builtonfacts\/2010\/05\/youre_a_member_of_the.php\">Built on Facts:  Sunday Function<\/a><\/p>\n<blockquote><p>Take an integer &#8211; one of at least several digits &#8211; and multiply it by itself twenty times. The result is going to be some really gargantuan number. Take the last 10 digits of that number. That&#8217;s the output of our function, which we&#8217;ll call h(n).<\/p>\n<p>\u2026<\/p>\n<p>The resistance can use this property of hash functions to make their resistance network more secure. Instead of distributing a list of all the agent&#8217;s passwords, the resistance can distribute a list of the hashes of their passwords. Thus if Bob knows that Alice&#8217;s hash is 7001140801, Alice can verify her identity by saying that her password is 314159, which has that as its hash. But if a Nazi double agent (let&#8217;s call her Eve) has managed to steal the list of hashes, she still can&#8217;t impersonate Alice. Eve doesn&#8217;t know what password to use to generate that hash. She could try thousands or millions of guesses and hope that eventually she found one with a hash that matches Alice&#8217;s hash, but with all the possible hashes that would be a herculean task.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Built on Facts: Sunday Function Take an integer &#8211; one of at least several digits &#8211; and multiply it by itself twenty times. The result is going to be some really gargantuan number. Take the last 10 digits of that &hellip; <a href=\"http:\/\/blogs.scienceforums.net\/swansont\/archives\/5580\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28,48],"tags":[],"class_list":["post-5580","post","type-post","status-publish","format-standard","hentry","category-math","category-security"],"_links":{"self":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/posts\/5580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/comments?post=5580"}],"version-history":[{"count":0,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/posts\/5580\/revisions"}],"wp:attachment":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/media?parent=5580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/categories?post=5580"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/tags?post=5580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}