Bits & Bytes
  • About
  • Art
  • Blog
  • Cooking
Subscribe
Tagged

cryptography

A collection of 1 post

Birthday Attack
math

Birthday Attack

Alot of the crypotgraphic software we use relies on hashing and it's uniqueness guarantees to provide core functionality, such asauthentication, message integrity, message fingerprinting, data corruption detection, etc... Guaranteeing this uniqueness however is fundamentally impossible following from the Pigeonhole Principle if your input data size is going to be larger

  • Ben Yu
Ben Yu Aug 18, 2018 • 2 min read
Bits & Bytes © 2025
Powered by Ghost