Library URL: Download cryptoBYOND
Available Functions:
SHA1();
SHA224();
SHA256();
SHA384();
SHA512();
How to use:
mob/verb/Test(T as text)
src<<SHA1(T);
src<<SHA224(T);
src<<SHA256(T);
src<<SHA384(T);
src<<SHA512(T);
Enjoy!

Library URL: Download cryptoBYOND Available Functions: SHA1(); How to use: mob/verb/Test(T as text) Enjoy! ![]() |
No problem. If you happen to come across any other hashing algorithm's that you would like to see in BYOND, I'll be more than happy to build it into this library.
|
Ssj4justdale
Actually, after downloading you've not included your code files. It's just a .dme |
I'll dual-boot my laptop and create a linux library, I'm busy at the moment attending other matters.
|
Zecronious wrote:
Ssj4justdale It was something with the compiler/packager not including the included files. I don't know what occurred but after fooling around for a bit, I got it to fix. |
Seeming as you're implementing known cryptography hashing functions, is there any harm in open sourcing?
Compiling for specific architectures allows certain speed improvements to be made. |
no harm whatsoever, just on my phone at the moment. What I meant to say is that i'll release the source after I build the linux library
|
Ssj4justdale wrote:
no harm whatsoever, just on my phone at the moment. What I meant to say is that i'll release the source after I build the linux library How's this coming along? |
Md5 has been proven time and time again to be completely insecure. It has hash collision issues (meaning sometimes there's two things that have the same hash) and has already been cracked. Meaning, even if you salt your hashes chances are someone can turn your md5 hash into plaintext anyway.
More info: https://crackstation.net/hashing-security.htm |
Heres the source / works on linux when compiled and libs installed.
#include <string> |
Doohl wrote:
Md5 has been proven time and time again to be completely insecure. It has hash collision issues (meaning sometimes there's two things that have the same hash) and has already been cracked. Meaning, even if you salt your hashes chances are someone can turn your md5 hash into plaintext anyway. So what? Nobody is going to do a cryptographic attack on a BYOND game. Also, chosen prefix attacks on MD5 are still crappy so there is no reasonable way to use its vulnerabilities in a practical BYOND setting. |
Thanks much!