Inspired by my recent conversations with Erik Arneson , Tres Henry , and Taylor Bell , I've been thinking a lot of late about the potential uses for cryptographic hashes in the creation of magical sigils. After playing around with the ideas a bit and making a few false starts, I've developed a proof of concept to share with the wider community. Background: What's a Cryptographic Hash? In the world of cryptography, a hash function is a one-way encryption operation. This means that source data (plaintext) can be encrypted with a hash function, but once encrypted it cannot be decrypted. This doesn't sound especially useful at first glance, but in truth these hash functions play a vital role in the world of information security. Because the same input will always give the same hashed output, the hash of a file or other piece of data serves as a unique signature of that input. This has many uses in file integrity checking, authentication, and other arenas, but from
Comments
Post a Comment