A .py application to hash secure user entered sensitive data or passwords using the SHA3-256 Crypto Algorithm, to make one's available online data secure & resistive against possible data breaches online.
- Download the .zip file from here
- Unzip/Extract the directory.
- Open the extracted directory in VsCode or any other IDE of your choice.
There are two ways to execute the application:
- Open the Terminal of your choosen IDE.
- Execute the main.py script, either by using the command:
py main.py
(Python execution) ornodemon main.py
(Node/Nodemon execution)
- (Make sure your system has Python/Node/Nodemon installed prior execution)
- After you have extracted the zip file, open it.
- Head towards the
/dist/main/main.exe
executable file location, link - Execute the file with double clicking it, the application will be launched.
- Enter your identity as asked (official/non-offcial)
- Enter the data/password you wanna hash
- The SHA3-256 Hash (HexCode) for the specified data will be generated
- Press
-1
: to terminate the application - Press
0
: to re-run main.py
- The hash algorithm used for hashing is SHA3-256
- It belongs to the SHA-3 Keccak hash family
- Based on the Sponge construction of cryptographic concept.
- A version of SHA3-256, the Keccak-256 is used in Ethereum Blockchain development.
- The hash has been fetched via Python's
hashlib
library.
- Secure Hash Algorithms | Cryptobook - Svetlin Nakov
- Password Hashing with Python | Medium - Felix Otoo
- SHA-3 Hash family | Wikipedia
- Keccak Documentation | Keccak Team
- The Sponge & Duplex constructions | Keccak Team
- Ethereum's Cryptographic Hash fucntion | Oreilly.com
- hashlib Documentation | docs.python.org