Allahmuad Abu Zhar
Member
So i just came up with this idea that i coded in 30 minutes. It's a custom hash function which turned out very well. I call it MAL-8 ( Multiple Algorithm Layers ) and the 8 is the count of all the algorithms it uses. So basically, the function generate a hash of a string with the following hash algorithms: md5, sha-512, sha-1, sha-384, RIPEMD-160, binary and sha-256. After that it takes the first letter of the hashed string and put them all together. Now i have a combined algorithm! Next up, i made so every algorithm is hashed to another hash that is hashed to the real string.
This makes it so, if they would too be able to decrypt every algorithm ( using bruteforce/dictionary attack etc... ), they would get another hash. Let me know what you think of this idea! just so you know, i dont really care if this is a very bad "algorithm". This is just for learning and i'm just 11 years old.
This makes it so, if they would too be able to decrypt every algorithm ( using bruteforce/dictionary attack etc... ), they would get another hash. Let me know what you think of this idea! just so you know, i dont really care if this is a very bad "algorithm". This is just for learning and i'm just 11 years old.
Last edited: