• intensely_human@lemm.ee
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    4
    ·
    1 year ago

    Right but that puts a limit on the hash algorithm’s input length. After a certain length you can’t guarantee a lack of collisions.

    Of course the probability stays low, but at a certain point it becomes possible.

    • brygphilomena@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      Collisions have always been a low concern. If, for arguments sake, I.hate.password. had a collision with another random password like kag63!gskfh-$93+"ja the odds of the collision password being cracked would be virtually non-existent. It’s not a statistically probable occurrence to be worried about.

    • __dev@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      2
      ·
      1 year ago

      This is plainly false. Hash collisions aren’t more likely for longer passwords and there’s no guarantee there aren’t collisions for inputs smaller than the hash size. The way secure hashing algorithms avoid collisions is by making them astronomically unlikely and that doesn’t change for longer inputs.