Skip to content

How do we obtain the data from Hash? #3170

Answered by krakxn
arnav029 asked this question in Q&A
Discussion options

You must be logged in to vote

@arnav029

Hey, you are incorrect in the reasoning behind it--one can just decrypt the data if the hashing function was known.

If it was not known, the hashing function precisely did its job of encrypting the password :)

There is no other deduction besides the above. Cryptographic hashing functions are primarily used for encrypting data; it is only that using them in a creative way to decrypt such data yields fascinating answers (for a relatable and straight-forward example, the usage of SHA256 to encrypt as well as verify in Bitcoin--there are other advanced concepts like public key recovery). You can take the latest research papers for ZK-proofs for an example.

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@krakxn
Comment options

Answer selected by alymurtazamemon
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants