2

How to detect a string's hash algorithm? Does each hash algorithms create a unique characteristic?

1
  • 5
    You can often guess based on the number of bits involved, but there are infinitely many functions that can generate a given hash. (If the set of possible functions is restricted to the popular algorithms, then you can usually narrow it down to 1 or 2. For example, a 32 character hex string, or 128 bit binary blob is almost always an md5 hash.) Commented Apr 2, 2012 at 9:24

1 Answer 1

4

All cryptographically strong hashes of a given bitlength (or equivalently, a hash with a longer bitlength that's been truncated) are indistinguishable by examining their outputs - because, in order to be a secure hash function, they have to produce evenly distributed outputs; any variation in their output would be an exploitable weakness.

Sign up to request clarification or add additional context in comments.

Comments

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.