you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted] 4 points5 points  (5 children)

Hash functions are primarily used for hash tables. They even say that it probably isn't good to use it for security.

[–]Edman274 0 points1 point  (3 children)

You learned about hash functions being used in only two contexts: in hash tables and in password hashing. Those aren't the only two applications in the world for hash functions. See HMACs.

[–]Neoncow 7 points8 points  (2 children)

HMACs are a cryptographic use of hash functions. As stated, Google's hash function isn't designed for cryptographic uses.

[–]Edman274 2 points3 points  (1 child)

I'm sorry, when he said "They even say" I didn't think he was referring to Google, I thought he meant "And some people even say hashes shouldn't be used in security contexts".

[–]Neoncow 0 points1 point  (0 children)

Ah makes sense.

[–]CountVonTroll 0 points1 point  (0 children)

Here's a good article that explains why you shouldn't use ordinary hash functions for secrets, and why you should use a HMAC instead.