Hacker News new | past | comments | ask | show | jobs | submit login

You don't need to know m, just h(m) which is commonly found in database breaches





That's just a "pre-image attack". A "second pre-image attack" is a different scenario, not relevant to password-hashing for the reasons grandparent described, where you already know a pre-image, and must find a different one.



Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: