You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: processor/redactionprocessor/README.md
-27Lines changed: 0 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -170,23 +170,6 @@ are `md5`, `sha1`, `sha3` (SHA-256), `hmac-sha256`, and `hmac-sha512`.
170
170
171
171
For enhanced security, especially when dealing with low-entropy data like IP addresses, HMAC (Hash-based Message Authentication Code) hash functions are recommended over simple hash functions like MD5, SHA1, or SHA3.
172
172
173
-
**Why HMAC?**
174
-
175
-
Simple hash functions are vulnerable to rainbow table attacks for low-entropy data:
176
-
- IPv4 address space: only 2^32 ≈ 4.3 billion possible values
177
-
- Attackers can pre-compute all possible IPv4 hashes to reverse the hashing
178
-
179
-
HMAC uses a secret key, making it practically impossible to:
180
-
- Reverse-engineer the original value without the key
181
-
- Use pre-computed rainbow tables
182
-
- Brute-force the hash even if the algorithm is known
183
-
184
-
**Benefits:**
185
-
- ✅ Consistency: Same input + same key = same output (required for pattern analysis)
186
-
- ✅ Irreversibility: Cannot reverse without the secret key
187
-
- ✅ Rainbow table resistant: Pre-computed hash tables are useless
0 commit comments