[Tutor] Clarification questions about how Python uses references.

Roel Schroeven roel at roelschroeven.net
Sun Jun 27 05:36:46 EDT 2021


Richard Damon schreef op 26/06/2021 om 2:59:
> One technique uses a hash function to ultimately get a fairly small
> number, to make lookup of values O(1) in a container.
> 
> The Second uses cryptographic secure hashes to verify a file. (This is
> where MD5 is used), This use has hashes that generate BIG numbers.

Indeed. It's a bit unfortunate that the same name is used for two 
distinct (but related) classes of functions.

Note that MD5 "should be considered cryptographically broken and 
unsuitable for further use." (https://www.kb.cert.org/vuls/id/836068) 
SHA-1 is compromised too. For cryptographic purposes, use SHA-256 at least.

-- 
"Honest criticism is hard to take, particularly from a relative, a
friend, an acquaintance, or a stranger."
         -- Franklin P. Jones

Roel Schroeven



More information about the Tutor mailing list