paint-brush
A Very Basic Intro to Hash Functions: SHA-256, MD-5, etcby@wagslane
367 reads
367 reads

A Very Basic Intro to Hash Functions: SHA-256, MD-5, etc

by Lane Wagner4mApril 10th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Hash functions are used all over the internet in order to securely store passwords, find duplicate records, quickly store and retrieve data, and more. The output of a hash function always has the same size regardless of the input. The original data can not be retrieved from the scrambled data (one-way function) This is important because it means that as a website developer, I only need to store the hash (scrambled data) of my user’s password to be able to verify them. It is a huge breach of security when websites store passwords in plain-text.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A Very Basic Intro to Hash Functions: SHA-256, MD-5, etc
Lane Wagner HackerNoon profile picture
Lane Wagner

Lane Wagner

@wagslane

Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

About @wagslane
LEARN MORE ABOUT @WAGSLANE'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Lane Wagner HackerNoon profile picture
Lane Wagner@wagslane
Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here