Talk:Rainbow table
![]() |
This article is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||
|
![]() | This article may be too technical for most readers to understand.(September 2010) |
"Picking R to be the identity is little better than a brute force approach." I see what you mean. But this does not always make sense as the space of passwords and that of hashes may be different in general. Eg we may be dealing with the space of 8 characters long passwords, while the set of hashes is that of binary words of length 32 (say), which is way smaller. — Preceding unsigned comment added by 2A01:CB10:8421:1500:88DC:756:D098:141B (talk) 06:16, 30 October 2021 (UTC)
Categories:
- C-Class Computing articles
- Mid-importance Computing articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- All Computer Security articles
- C-Class Computer Security articles of Mid-importance
- All Computing articles
- C-Class Cryptography articles
- High-importance Cryptography articles
- C-Class Computer science articles
- High-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles