Python Random String Hashing
Python Random String Hashing
string.ascii_letters
The concatenation of the ascii_lowercase and
ascii_uppercase constants described below.
What is ASCII? ASCII (American Standard Code for Information Interchange) is
the most common character encoding format for text data in computers and on the
internet. In standard ASCII-encoded data, there are unique values for 128
alphabetic, numeric or special additional characters and control codes.
string.ascii_lowercase
The lowercase
letters 'abcdefghijklmnopqrstuvwxyz'.
string.ascii_uppercase
The uppercase
letters 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
string.digits
The string '0123456789'.
string.hexdigits
The string '0123456789abcdefABCDEF'.
string.octdigits
The string '01234567'.
string.punctuation
String of ASCII characters which are considered
punctuation characters in the C locale: !"#$
%&'()*+,./:;<=>?@[\]^_`{|}~.
Hashing Algorithm
A hashing algorithm is a mathematical
function that garbles data and makes it
unreadable.
Hashing algorithms are one-way programs, so the text can’t be unscrambled and
decoded by anyone else. And that’s the point. Hashing protects data at rest, so even
if someone gains access to your server, the items stored there remain unreadable.
Hashing can also help you prove that data isn’t adjusted or altered
after the author is finished with it. And some people use hashing to
help them make sense of reams of data.
What Are Hashing Algorithms Used
For?
The very first hashing algorithm, developed in 1958,the
KWIC algorithm was used for classifying and
organizing data. Since then, developers have discovered
dozens of uses for the technology.
Password storage. You must keep records of all of the
username/password combinations people use to access your
resources. But if a hacker gains entry, stealing unprotected
data is easy. Hashing ensures that the data is stored in a
scrambled state, so it's harder to steal.
Digital signatures. A tiny bit of data proves
that a note wasn't modified from the time it
leaves a user's outbox and reaches your inbox.
Document management. Hashing algorithms can
be used to authenticate data. The writer uses a hash
to secure the document when it's complete. The hash
works a bit like a seal of approval. A recipient can
generate a hash and compare it to the original. If the
two are equal, the data is considered genuine. If they
don't match, the document has been changed.