1. Using 128-bits as an input for hashing using SHAKE-3 (128-output)
  2. How does salt make a password secure against dictionary attacks

  3. Why is salt+nonce authentification over insecure channel vunrable to man-in-the-middle attack?

  4. is the hash of a hash of a password, equally or more safe than hashing just once?
  5. Determine encryption with 3 parameters provided

  6. My ISP shows my WiFi password on their public site in plain text. Should I be worried?

  7. Pip verify packet integrity

  8. Password hashes with large internal state
  9. Why should I hash passwords?
  10. Identifying documents by hash: what are the security implications?

  11. Benefits to client-side password hashing on top of other security mechanisms

  12. Secure preshared key 2 way authentication

  13. Login details security using salt and hash, and a login role in postgresql

  14. Using passwords made of words

  15. How to store salt?

  16. Why do salts for hashing passwords need to be globally unique, not just system/site-unique?

  17. What are the differences between MD5, SHA and RSA?

  18. Why am I unable to capture LM & LMHASH?
  19. Why does Keybase sign hashes of previous proofs?
  20. How to separate storing sensitive data and hash passwords?
  21. SHA, RSA and the relation between them
  22. PTH & Salted Passwords
  23. How is a "SHA256 reduced by X of Y rounds" built?
  24. How can I check the integrity of a Bitcoin tarball with GPG?
  25. Is salting a hash more secure than encrypting it?
  26. Does a completely random string produce a completely random hash

  27. Is this a secure way of storing passwords?
  28. Double hashing passwords between Java microservices to increase security?

  29. Do I must require Authentication for resources with an Hash-key?

  30. Seeking Review for Authentication and Message Encryption Approach
  31. Publish a PDF on a website with MD5 Hash
  32. John the Ripper Character Lists

  33. Can a neural network crack hashing algorithms?
  34. Why is the password hashes in my database the exact same for all my users?
  35. Protecting Passwords Using Short Hash Length
  36. Why should passwords be compared by means of a byte array?

  37. Hashing, then encrypting the data combined with the hash, using the hash as the key
  38. Would it be considered good practice to make the salt for a password the hash of the user's username?

  39. Is blockchain security dependent on number of transactions in time?
  40. Line Length Exception in hashcat
  41. What are rainbow tables and how are they used?
  42. How to prevent username and password matches when changing a username?

  43. Why is hashing (digest) employed in digital signatures?
  44. Hash, salt and best practices

  45. How do user get access to login when passwords are stored in MD5?

  46. Why is SHA1 considered less secure than often necessary?

  47. Find salt from md5 hash if password is known

  48. How to extract the password hash from a password-protected container?
  49. Am I required to hash passwords

  50. Given a hash value, is it possible to determine the length of the initial string that was digested? (SHA256)
  51. How weak is MD5 as a password hashing function ?
  52. What is the best way to represent heavy hash decryption for a hacker movie?

  53. Scrambling a salted password before hashing. Good idea or unnecessary?

  54. Shouldn't popular cryptographic hash functions encode the length of the input data in the output?
  55. Understanding how linux openssl passwords work
  56. How do I find the number of hash calculation required to reverse a hash?

  57. MD5 Preimage Vulnerability in 2017

  58. What harm is there in obtaining password hashes in a Windows environment?
  59. How long should I wait before choosing a hash function?
  60. Would it be okay to check only a part of a hash value
  61. non-cryptographic hash function with output changing just as much as the input

  62. what to do if your online banking has low security standards

  63. Password Hashing

  64. Send hash password or send password to hash in server?

  65. Solution to calculate and store a hash salt in an open source application?

  66. When hashing, do longer messages have a higher chance of collisions?

  67. Why are these two hashes different?
  68. Storing Old Passwords. Bad Security

  69. Inconsistency Among MD5, SHA1, and SHA256 Hashing Protocols

  70. Password Hashing Flaw
  71. Why is there a Cap on Password length?

  72. Any reason to slow hash passwords generated randomly by our site?

  73. What is the difference between a Hash Function and a Cryptographic Hash Function?
  74. Why secure encrypted data consistency by strong hashing?
  75. what is the point of integrity checking on downloaded files
  76. Can Hash Length Extension attacks be avoided by changing the data structure?

  77. Extract Password Hashes from Active Directory LDAP

  78. Bruteforce with hashcat, how to set the mask properly?
  79. How does file hashing works?

  80. How does PHP's password_hash() BCRYPT cost factor translate into cracking computation times

  81. Using the password hash as a reset token
  82. Security in Windows Update Procedure?

  83. Mathematical calculation to get the minimum lenght of a hash collision attack?

  84. How find the hash creation method knowing password, salt, and resulting hash?

  85. Do any security experts recommend bcrypt for password storage?

  86. Is xxhash a one-way hash?

  87. Cracking MD4 hash
  88. Using MD5 as salt

  89. Different CRC32 implementations? different results?

  90. Find algorithm from Digest and Plaintext

  91. Is it useful to hash the password before sending to server for authentication?

  92. Is it bad practice to let the user know its hashed password?

  93. Identifying a hash function

  94. https security - should password be hashed server-side or client-side?

  95. Why do major sites(Facebook, Google, etc) still send passwords unhashed?
  96. With PBKDF2, what is an optimal Hash size in bytes? What about the size of the salt?

  97. (Why) does an encrypted MS Office 2010 Spreadsheet (need to) have the password hash "written down"?

  98. Password Hashing: add salt + pepper or is salt enough?
  99. Why is client-side hashing of a password so uncommon?
  100. How to make an encrypted field searchable?