Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

cryptographic hash functions are crypto primitives (=building blocks), and very useful such. The hash function is simple and fast by itself but can be used in safe constructions. This is completely fine. One example is PBKDF2 using HMAC-SHA-1 and many iterations.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: