This repository has been archived on 2023-11-03 . You can view files and clone it, but cannot push or open issues or pull requests.
master
MagicHashes
Some tools to (try to) break "Magic Hashes".
Introduction
If you wonder what a "magic hash" is, please check this link.
At the time of writing, no such hashes have been found against the SHA-2 family.
This repository contains three different (pretty naive) brute-forcing implementations.
They have been developed to output exactly the same piece of information, when matching.
Usage
C
# Install dependency (Debian example) :
aptitude install libssl-dev
# Compilation time :
gcc -Wall -Wextra -O3 -std=c99 -o magic_hashes_random.out magic_hashes_random.c -lssl -lcrypto
gcc -Wall -Wextra -O3 -std=c99 -o magic_hashes_iterative.out magic_hashes_iterative.c -lssl -lcrypto
# Execution time :
./magic_hashes_random.out
./magic_hashes_iterative.out
Python
python3 magic_hashes_random.py
Performances
As far as I can tell, and on my setups only :
- The random C implementation is ~75% faster than the Python one.
- The iterative C implementation is ~10% faster than the C random one.
Description
🔨 Some tools to (try to) break "Magic Hashes"
https://git.forestier.app/HorlogeSkynet/MagicHashes
Readme
27 KiB
Languages
C
84.9%
Python
15.1%