• intensely_human@lemm.ee
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      4
      ·
      1 year ago

      Right but that puts a limit on the hash algorithm’s input length. After a certain length you can’t guarantee a lack of collisions.

      Of course the probability stays low, but at a certain point it becomes possible.

      • brygphilomena@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 year ago

        Collisions have always been a low concern. If, for arguments sake, I.hate.password. had a collision with another random password like kag63!gskfh-$93+"ja the odds of the collision password being cracked would be virtually non-existent. It’s not a statistically probable occurrence to be worried about.

      • __dev@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        2
        ·
        1 year ago

        This is plainly false. Hash collisions aren’t more likely for longer passwords and there’s no guarantee there aren’t collisions for inputs smaller than the hash size. The way secure hashing algorithms avoid collisions is by making them astronomically unlikely and that doesn’t change for longer inputs.