Library URL: Download cryptoBYOND
Available Functions:
SHA1();
SHA224();
SHA256();
SHA384();
SHA512();
How to use:
mob/verb/Test(T as text)
src<<SHA1(T);
src<<SHA224(T);
src<<SHA256(T);
src<<SHA384(T);
src<<SHA512(T);
Enjoy!
Library URL: Download cryptoBYOND Available Functions: SHA1(); How to use: mob/verb/Test(T as text) Enjoy! |
No problem. If you happen to come across any other hashing algorithm's that you would like to see in BYOND, I'll be more than happy to build it into this library.
|
Ssj4justdale
Actually, after downloading you've not included your code files. It's just a .dme |
I'll dual-boot my laptop and create a linux library, I'm busy at the moment attending other matters.
|
In response to Zecronious
|
|
Zecronious wrote:
Ssj4justdale It was something with the compiler/packager not including the included files. I don't know what occurred but after fooling around for a bit, I got it to fix. |
In response to Ssj4justdale
|
|
Seeming as you're implementing known cryptography hashing functions, is there any harm in open sourcing?
Compiling for specific architectures allows certain speed improvements to be made. |
no harm whatsoever, just on my phone at the moment. What I meant to say is that i'll release the source after I build the linux library
|
In response to Ssj4justdale
|
|
Oh okay, cool!
|
In response to Ssj4justdale
|
|
Ssj4justdale wrote:
no harm whatsoever, just on my phone at the moment. What I meant to say is that i'll release the source after I build the linux library How's this coming along? |
In response to Toadfish
|
|
Md5 has been proven time and time again to be completely insecure. It has hash collision issues (meaning sometimes there's two things that have the same hash) and has already been cracked. Meaning, even if you salt your hashes chances are someone can turn your md5 hash into plaintext anyway.
More info: https://crackstation.net/hashing-security.htm |
Heres the source / works on linux when compiled and libs installed.
#include <string> |
In response to Doohl
|
|
Doohl wrote:
Md5 has been proven time and time again to be completely insecure. It has hash collision issues (meaning sometimes there's two things that have the same hash) and has already been cracked. Meaning, even if you salt your hashes chances are someone can turn your md5 hash into plaintext anyway. So what? Nobody is going to do a cryptographic attack on a BYOND game. Also, chosen prefix attacks on MD5 are still crappy so there is no reasonable way to use its vulnerabilities in a practical BYOND setting. |
Thanks much!