Utility of hash functions and what are they used for
Had a funny talk with a coworker, so I figured I might share some... A lot of people online(coworker included..) think cryptographic hash functions are pure math wizardry, but the concept is actually simple.
Think of a hash function like a digital blender. You throw anything into the pile. It can be a single password, a photo, or a video file, and you hit blend. The blender always spits out a fixed length string of random letters and numbers (aka the hash)
Here are the essential rules that make it work:
-You can blend it up, but you can't look reverse-engineer it back into the ingredients. This is why websites store the hash of your password, not the actual password. If hackers steal the data, they just get useless scrambled codes.
-Minor changes will break it. If someone changes a single comma in a file, the hash changes completely. This is how one could check if a file has been tampered with.
Basically, hashes are just unique digital fingerprints keeping the internet secure and since the hashes can persist, they can be re-used.
Does anyone know of any risks hash configurations have? Also, if someone has more to share about utility of using a hash configuration in programming workflows, id love to hear of it. Right now I'm working on a discussion page foundation where a user could register an account within an encrypted database and they should login using hashes. Struggling with some integrations, since the same account in the database needs to work for a browser game component on the site. Still not fully having a working prototype at this time due to some errors with my hash structures. Taking a breather and hoping someone might give me more ideas to work from in the meantime