Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
lorentz1519915hTechnically a hash that is reversible on 20% of inputs is a lossy compression algo; you can recover 20% of the input in a statistical sense.
-
lorentz1519915hHash functions are rarely fully reversible, usually a weak hash will either reveal partial information about the input or reveal only some inputs. Technically, if you have a massive lookup table, a perfect hash is a perfect compression algo.
-
CoreFusionX344811hHash functions are not reversible by definition.
Flaws in desired properties such as uniformity or collision probability can be found, all right.
But that still doesn't allow you to retrieve the full original message.
It can break some security schemes, but that's because of how hashes are used.
Lossy compression and hashing kinda overlap, but are not the same.
A good hashing function is greatly sensitive to very small changes in input (non locality property), whereas lossy compression shouldn't be. Small changes in input should result in perceptually similar output.
Are all hash functions lossy compression? Mathematically, yes. (You could have higher cardinality on the image space, sure, but then I guess it's not really a hash function).
But neither every hash function makes for suitable lossy compression, nor every lossy compression algorithm makes for a secure hash function. -
CoreFusionX344811hIn fact, they are polar opposites.
The more "continuous" (in the mathematical sense) a hash function is, the less suitable it is as secure hashing, but the better it is at lossy compression.
And given algorithms are researched to improve on their expected usage, yeah, no, there's no overlap, save for certain mathematical technicalities. -
@blessing1121
I don't think you have any business here, but you know, the way you promote it, I think it's legit.
If you need workforce, please contact me at putaperrosanchez[at]gmail[dot]com, I'd be delighted to help you pursue your noble endeavours.
Hoping to hear from you, have a nice evening! -
Hazarth91324hYeah, hash is about as reversible as recovering X from
X % 3 = 2
recover X....
You can use attacks on some weaknesses and dictionary comparisons if you know the data is at least actual language (or some other known final form) but that's about it
If a hashing algorithm is insecure, doesn't that make it a great compression algorithm instead?
joke/meme