Ah, yes, the thrill of downgrading from modern cryptographic marvels to hash functions that even your toaster would mock. 🤦♂️ Why settle for the robust #security of SHA256 when you can embrace the "cheapest, stupidest" algorithms that even a toddler could outsmart? 🙃🔐
https://purplesyringa.moe/blog/simplest-hash-functions/ #cryptography #hashfunctions #downgrade #techhumor #toasteralgorithms #HackerNews #ngated
https://purplesyringa.moe/blog/simplest-hash-functions/ #cryptography #hashfunctions #downgrade #techhumor #toasteralgorithms #HackerNews #ngated

Simplest hash functions
What came to your mind when you read “hash functions” in the title? If you’re pragmatic, you probably remembered SHA-256 or MD5. Those are cryptographic hash functions, and they work fast and well for arbitrary inputs, even if they are supplied by malicious actors. Or at least they’re designed to. That’s the exact opposite of what I want to talk about. I want to talk about the cheapest, stupidest, most ridiculous hash functions you can get away with.