5
gemsy
18h

If a hashing algorithm is insecure, doesn't that make it a great compression algorithm instead?

Comments
  • 1
    No but it might be a good compassion algo.
  • 2
    Technically a hash that is reversible on 20% of inputs is a lossy compression algo; you can recover 20% of the input in a statistical sense.
  • 1
    Hash functions are rarely fully reversible, usually a weak hash will either reveal partial information about the input or reveal only some inputs. Technically, if you have a massive lookup table, a perfect hash is a perfect compression algo.
  • 1
    Hash functions are not reversible by definition.

    Flaws in desired properties such as uniformity or collision probability can be found, all right.

    But that still doesn't allow you to retrieve the full original message.

    It can break some security schemes, but that's because of how hashes are used.

    Lossy compression and hashing kinda overlap, but are not the same.

    A good hashing function is greatly sensitive to very small changes in input (non locality property), whereas lossy compression shouldn't be. Small changes in input should result in perceptually similar output.

    Are all hash functions lossy compression? Mathematically, yes. (You could have higher cardinality on the image space, sure, but then I guess it's not really a hash function).

    But neither every hash function makes for suitable lossy compression, nor every lossy compression algorithm makes for a secure hash function.
  • 2
    In fact, they are polar opposites.

    The more "continuous" (in the mathematical sense) a hash function is, the less suitable it is as secure hashing, but the better it is at lossy compression.

    And given algorithms are researched to improve on their expected usage, yeah, no, there's no overlap, save for certain mathematical technicalities.
  • 0
    @blessing1121

    I don't think you have any business here, but you know, the way you promote it, I think it's legit.

    If you need workforce, please contact me at putaperrosanchez[at]gmail[dot]com, I'd be delighted to help you pursue your noble endeavours.

    Hoping to hear from you, have a nice evening!
  • 1
    Yeah, hash is about as reversible as recovering X from

    X % 3 = 2
    recover X....

    You can use attacks on some weaknesses and dictionary comparisons if you know the data is at least actual language (or some other known final form) but that's about it
  • 0
    @Hazarth ask one of those recovery wizard hackers 😂
Add Comment