//
archives

hash

This tag is associated with 3 posts

Sign here ……………………

How do signatures function? A signature is a sign, seal, or mark on a document indicating its authenticity, as when a painter signs a painting, or someone signs a letter or legal document. The signature and the thing it marks is meant to be a one-off. The signature marks an original document, before the thing … Continue reading

An anti-hacker puzzle

Following on from my previous post … Here’s a simple puzzle challenge. The SHA256 hashing algorithm (see earlier post: Immutable data) converts any string of text (integers or letters) into a (near) unique 64 character long string of numbers and letters. Using this algorithm the string “301253” (someone’s birthdate) translates to the string of characters … Continue reading

Why hackers have to work hard

A 4 digit mechanical combination lock is designed so that a person trying to break into your locker (a padlock hacker) would have to try on average 5,000 combinations (104/2). That’s about 2-5 hours work, which is a big investment in time, and before the hacker exhausts all iterations he or she may well be … Continue reading

University of Edinburgh logo

Richard on Facebook

Latest FB image
Or "like" my Facebook page for blog updates.

Try a one year research degree

AHRC/EPSRC/ESRC/MRC project

book cover
book cover

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 370 other followers