[Tutor] Clarification questions about how Python uses references.
Roel Schroeven
roel at roelschroeven.net
Sun Jun 27 05:36:46 EDT 2021
Richard Damon schreef op 26/06/2021 om 2:59:
> One technique uses a hash function to ultimately get a fairly small
> number, to make lookup of values O(1) in a container.
>
> The Second uses cryptographic secure hashes to verify a file. (This is
> where MD5 is used), This use has hashes that generate BIG numbers.
Indeed. It's a bit unfortunate that the same name is used for two
distinct (but related) classes of functions.
Note that MD5 "should be considered cryptographically broken and
unsuitable for further use." (https://www.kb.cert.org/vuls/id/836068)
SHA-1 is compromised too. For cryptographic purposes, use SHA-256 at least.
--
"Honest criticism is hard to take, particularly from a relative, a
friend, an acquaintance, or a stranger."
-- Franklin P. Jones
Roel Schroeven
More information about the Tutor
mailing list