Skip to main content

Questions tagged [hashing]

Challenges that involve summarizing a large amount of data in a single, much smaller number.

Filter by
Sorted by
Tagged with
3 votes
1 answer
321 views

This is the robbers thread of this cops and robbers challenge. The cops thread is here. Related, but hashes numbers instead of strings and uses a different scoring system. Definitions A hash collision ...
The Empty String Photographer's user avatar
7 votes
1 answer
349 views

This is the cops thread of this cops and robbers challenge. The robbers thread is here. Related, but hashes numbers instead of strings and uses a different scoring system. Definitions A hash collision ...
The Empty String Photographer's user avatar
31 votes
30 answers
3k views

With challenges like Output with the same length as the code and Create output twice the length of the code, I thought of a separate, but similar challenge. The task is to produce an output. It can ...
maxb's user avatar
  • 7,017
1 vote
4 answers
470 views

This riddle was inspired by that thread. Consider that you are super-hacker and try to break MD5 hashing algorithm by looking for a hash collisions for a given hash string which your friend gave to ...
Agnius Vasiliauskas's user avatar
14 votes
8 answers
2k views

Imagine we have some polyomino and would like to uniquely identify them, however the polyominos can be rotated, so blindly hashing them won't give us the same fingerprint for a piece and a rotation ...
ბიმო's user avatar
16 votes
14 answers
2k views

Consider you have a hash function \$\mathcal{H}\$ which takes strings of length \$2n\$ and returns strings of length \$n\$ and has the nice property that it is collision resistant, i.e. it is hard to ...
Laikoni's user avatar
  • 26.4k
13 votes
15 answers
2k views

Make a program that simulates the basic logic gates. Input: An all-caps word followed by 2 1 digit binary numbers, separated by spaces, such as OR 1 0. The gates <...
qazwsx's user avatar
  • 1,194
36 votes
19 answers
4k views

According to RollingStone, below are the 26 greatest singers of all time: ...
Arnauld's user avatar
  • 206k
9 votes
9 answers
2k views

The challenge is simple Write a script that, when given a string input, will hash the string using the MD2 hashing algorithm, and then return either a positive integer or negative integer output ...
Mayube's user avatar
  • 11.8k
20 votes
3 answers
880 views

Background On this site, we occasionally have questions requiring programs to be "radiation hardened"; this means that the program has to be able to survive the deletion of one or more bytes, no ...
user avatar
10 votes
5 answers
868 views

XKCD Comic: Goal: Given a date, the current Dow Opening, and your current coordinates as a rounded integer, produce a "geohash." Input: Input through any reasonable means (STDIN, function argument, ...
Julian Lachniet's user avatar
36 votes
10 answers
3k views

Background The computer game NetHack dates from 1987, before the use of graphics in computer games was widely established. There are lots of monsters in the game, and potentially a lot need to fit on ...
user avatar
26 votes
5 answers
2k views

Given a sequence of bytes, output the SHA-256 hash value of the sequence. The SHA-256 Algorithm The following pseudocode is taken from the Wikipedia page for SHA-2. ...
user avatar
14 votes
9 answers
2k views

Credits This challenge originated from @miles. Create a function that computes the CRC32 hash of an input string. The input will be an ASCII string of any length. The output will be the CRC32 hash of ...
Leaky Nun's user avatar
  • 50.6k
72 votes
24 answers
5k views

In this code-challenge you will write a hash function in 140 bytes1 or less of source code. The hash function must take an ASCII string as input, and return a 24-bit unsigned integer ([0, 224-1]) as ...
orlp's user avatar
  • 39.4k
17 votes
5 answers
3k views

In the Bitcoin protocol, 2016 is a very special number. The "difficulty" of finding a hash to create a new block is adjusted every 2,016 blocks to approximate changing once every two weeks. This ...
Joe Z.'s user avatar
  • 35.5k
2 votes
0 answers
1k views

Challenge: make a program that outputs a MD5 hash of its source code. You should not use tricks that would be considered cheating in a quine sense (discussed here). Using built-in functions and ...
anatolyg's user avatar
  • 14.2k
12 votes
20 answers
4k views

This contest is over. There are no remaining crackable answer in the cops challenge. Companion thread of Cryptographic hash golf As a reminder, here are the rules for robbers from the main ...
Dennis's user avatar
  • 212k
35 votes
23 answers
5k views

This contest is over. Due to the nature of cops-and-robbers challenges, the cops challenge becomes a lot easier when the interest in the associated robbers challenge has diminished. Therefore, ...
Dennis's user avatar
  • 212k
10 votes
6 answers
554 views

My friend and I have this game that we play with words. It is a fun pastime and it involves "canceling out" letters in a word until there is nothing left. I am really tired of him being so ...
Maltysen's user avatar
  • 25.8k
8 votes
6 answers
3k views

The Challenge Create a program that brute-force* decodes the MD5-hashed string, given here: 92a7c9116fa52eb83cf4c2919599c24a which translates to ...
parzivail's user avatar
8 votes
4 answers
6k views

Hash Un-hashing The basic goal of this challenge is to exploit the high probability of collision in the Java Hash function to create a list of plausible inputs that created an outputted hash. The ...
jocopa3's user avatar
  • 183
-2 votes
3 answers
859 views

So you are tasked with creating an open source password authentication system but you want to reveal as little about the implementation of the hash function as possible. Can you write a function that ...
ford prefect's user avatar
66 votes
20 answers
8k views

This Code Golf was inspired by the recent Daily WTF article You Can't Handle the True!, which features a string comparison written as: ...
dan04's user avatar
  • 6,651
6 votes
10 answers
2k views

Your goal is to write a hash function, that accepts morse code character and returns a hash code that you get to define. You can be sure, passed string will be: One of the Latin characters (A-Z) ...
awesoon's user avatar
  • 187
15 votes
7 answers
2k views

This question involves taking input in Morse code as . (period) and - (minus symbol), with spaces to separate the input. Your task is to convert the code to standard output. You can assume that the ...
user avatar
15 votes
5 answers
1k views

The goal of this code-golf is to create a program that takes a string as input, and you have to output the SHA-1 hash value as a hexadecimal number. You can find the pseudocode for SHA-1 here Other ...
user3094403's user avatar
  • 8,375