SaaSHub helps you find the best software and product alternatives Learn more →
Top 8 C Hashing Projects
-
prvhash
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (inline C/C++) (Codename Gradilac/Градилак)
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
komihash
Very fast, high-quality hash function, discrete-incremental and streamed hashing-capable (non-cryptographic, inline C/C++) 26GB/s + PRNG
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
Project mention: Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video] | news.ycombinator.com | 2023-08-08when you look properly at the end of the video the root hash starts with $y$ implying its yescrypt
more info here https://manpages.debian.org/unstable/libcrypt-dev/crypt.5.en...
https://www.openwall.com/yescrypt/
once you have the hash you have to use some rainbow tables if they exist for that hash function or bruteforce it
the authors of yescrypt claim: "Technically, yescrypt is the most scalable password hashing scheme so far, providing near-optimal security from offline password cracking across the whole range from kilobytes to terabytes and beyond. "
in any way, this is a local attack, someone / some software on your local machine would need to execute it so i am not overly stressed, password hashes leak all the time from all different sources
yet, it does worry me because my AMD stock is dropping on value because of this today :D
Project mention: How do crypto functions deal with the issue of character size? (e.g. Unicode) | /r/cryptography | 2023-06-18Hey guys. If you remember me from several months ago, with this object de art, I am here with a less cringy question than that of 'I made a hash function!!!111'. I apologize if this question is basic btw. My question is, how do crypto functions, of any kind, deal with character size? For example in C, wchar_t is either 2 or 4 bytes. So, if the implementation goes through the stream like stream++ it will be stepping word-wise not byte-wise. And then if another machine, using a different implementation, reads the stream byte-wise and not word-wise, then it won't get the same message right?
C Hashing related posts
- Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video]
- Streamed Hashing Added to Komihash 4.6. Very Fast Hash Function (in C), competitor to xxhash, wyhash. Java port available.
- komihash 4.4 released - a very fast hash function (competitor to xxhash, wyhash), C
- Komirand (64-bit C) - Simple, reliable, self-starting, fast (0.73 cycles/byte) PRNG with 2^64 period. Spin-off from Komihash.
- Komihash – Fast Hash Function
- Very Fast Non-Cryptographic Hash Function (competitor to wyhash, xxhash), C
- I Nearly Lost the Lightroom Catalog with All My Photos
-
A note from our sponsor - SaaSHub
www.saashub.com | 26 Apr 2024
Index
What are some of the best open-source Hashing projects in C? This list will help you:
Project | Stars | |
---|---|---|
1 | zpl | 960 |
2 | prvhash | 297 |
3 | komihash | 176 |
4 | yescrypt | 114 |
5 | CatCrypto | 68 |
6 | hmac-bcrypt | 59 |
7 | PoxHash | 7 |
8 | ZedmeeHash | 1 |
Sponsored