-
So let's say the use of hash function for the use of storing passwords . Now we have a hash function for the password which is so secured that the password cannot be obtained from the hash ! But I have a simple query , that if we cannot obtain the original input , what is the use of it as no one can find the input? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Hey, you are incorrect in the reasoning behind it--one can just decrypt the data if the hashing function was known. If it was not known, the hashing function precisely did its job of encrypting the password :) There is no other deduction besides the above. Cryptographic hashing functions are primarily used for encrypting data; it is only that using them in a creative way to decrypt such data yields fascinating answers (for a relatable and straight-forward example, the usage of SHA256 to encrypt as well as verify in Bitcoin--there are other advanced concepts like public key recovery). You can take the latest research papers for ZK-proofs for an example. |
Beta Was this translation helpful? Give feedback.
@arnav029
Hey, you are incorrect in the reasoning behind it--one can just decrypt the data if the hashing function was known.
If it was not known, the hashing function precisely did its job of encrypting the password :)
There is no other deduction besides the above. Cryptographic hashing functions are primarily used for encrypting data; it is only that using them in a creative way to decrypt such data yields fascinating answers (for a relatable and straight-forward example, the usage of SHA256 to encrypt as well as verify in Bitcoin--there are other advanced concepts like public key recovery). You can take the latest research papers for ZK-proofs for an example.