Invitation to Computer Science 8th Edition

Published by Cengage Learning
ISBN 10: 1337561916
ISBN 13: 978-1-33756-191-4

Chapter 8 - Exercises - Page 427: 3b

Answer

This hashing algorithm is not secure because it is very easy to get back the original string from the hash.

Work Step by Step

Since all the components of hash are separated by 0 we can get all individual letters by reverse applying the hash algorithm so this algorithm is not secure.
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.