Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day ago60% of MD5 password hashes are crackable in under an hourwww.theregister.comexternal-linkmessage-square41linkfedilinkarrow-up1172arrow-down18
arrow-up1164arrow-down1external-link60% of MD5 password hashes are crackable in under an hourwww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square41linkfedilink
minus-squareoptional@sh.itjust.workslinkfedilinkEnglisharrow-up3·1 day agoIf you need hashing for non-security applications, that’s fine, but I’d still suggest SHA-1 or -25 or even just CRC instead, as that’s something modern (as in less than 15 years old) CPUs can usually do directly in Hardware.
If you need hashing for non-security applications, that’s fine, but I’d still suggest SHA-1 or -25 or even just CRC instead, as that’s something modern (as in less than 15 years old) CPUs can usually do directly in Hardware.