Score:0

If the source code of SHA256 hashing algorithm is available in public, why can't it be hacked?

in flag

If the SHA256 algorithm is public, why can't attackers use it to create more collisions rendering the algorithm useless?

kelalaka avatar
in flag
Because it is one-way function.
Maarten Bodewes avatar
in flag
Finding collisions doesn't make a hash function "useless" either, it depends what it is used for. It may still create well distributed output and may be invulnerable against pre-image attacks. The generation of collisions also has per-conditions attached to them. Of course, we'd still favor unbroken hash functions, which is why everybody steers away from MD5 and SHA-1.
fgrieu avatar
ng flag
There simply is no reason that being public implies being weak. Thus indeed the question boils down to: _What makes SHA-256 secure?_
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.