Questions tagged [hashing]
Challenges that involve summarizing a large amount of data in a single, much smaller number.
27 questions
3
votes
1
answer
317
views
Hashers and Crashers (Robbers)
This is the robbers thread of this cops and robbers challenge. The cops thread is here.
Related, but hashes numbers instead of strings and uses a different scoring system.
Definitions
A hash collision ...
31
votes
30
answers
3k
views
Output with the same length always
With challenges like Output with the same length as the code and Create output twice the length of the code, I thought of a separate, but similar challenge.
The task is to produce an output. It can ...
14
votes
8
answers
2k
views
Rotation invariant fingerprinting
Imagine we have some polyomino and would like to uniquely identify them, however the polyominos can be rotated, so blindly hashing them won't give us the same fingerprint for a piece and a rotation ...
13
votes
15
answers
2k
views
Logic Gates Manually
Make a program that simulates the basic logic gates.
Input: An all-caps word followed by 2 1 digit binary numbers, separated by spaces, such as OR 1 0. The gates <...
9
votes
9
answers
2k
views
What characters are more common in my MD2 hash?
The challenge is simple
Write a script that, when given a string input, will hash the string using the MD2 hashing algorithm, and then return either a positive integer or negative integer output ...
10
votes
5
answers
868
views
Geohash Generator
XKCD Comic:
Goal:
Given a date, the current Dow Opening, and your current coordinates as a rounded integer, produce a "geohash."
Input:
Input through any reasonable means (STDIN, function argument, ...
26
votes
5
answers
2k
views
Implement SHA-256
Given a sequence of bytes, output the SHA-256 hash value of the sequence.
The SHA-256 Algorithm
The following pseudocode is taken from the Wikipedia page for SHA-2.
...
72
votes
24
answers
5k
views
Tweetable hash function challenge
In this code-challenge you will write a hash function in 140 bytes1 or less of source code. The hash function must take an ASCII string as input, and return a 24-bit unsigned integer ([0, 224-1]) as ...
2
votes
0
answers
1k
views
Make a program that outputs its own MD5 hash [duplicate]
Challenge: make a program that outputs a MD5 hash of its source code.
You should not use tricks that would be considered cheating in a quine sense (discussed here).
Using built-in functions and ...
35
votes
23
answers
5k
views
Cryptographic hash golf
This contest is over.
Due to the nature of cops-and-robbers challenges, the cops challenge becomes a lot easier when the interest in the associated robbers challenge has diminished. Therefore, ...
8
votes
6
answers
3k
views
Decode MD5, Brute Force
The Challenge
Create a program that brute-force* decodes the MD5-hashed string, given here:
92a7c9116fa52eb83cf4c2919599c24a which translates to ...
-2
votes
3
answers
858
views
Hide your hash function
So you are tasked with creating an open source password authentication system but you want to reveal as little about the implementation of the hash function as possible. Can you write a function that ...
6
votes
10
answers
2k
views
Write a hash function for Morse Code [closed]
Your goal is to write a hash function, that accepts morse code character and returns a hash code that you get to define.
You can be sure, passed string will be:
One of the Latin characters (A-Z) ...
15
votes
5
answers
1k
views
Implementing the SHA-1 hash algorithm
The goal of this code-golf is to create a program that takes a string as input, and you have to output the SHA-1 hash value as a hexadecimal number. You can find the pseudocode for SHA-1 here
Other ...