Can iterated hashes be used to create cryptographically secure random data from strong random seed?

I was wondering if generation of sequential hashes from random seed can be considered "random enough" to be used in cryptographic operations?
By sequential hashes I mean the following:
First we create a hash using e.g. SHA512 fro… Continue reading Can iterated hashes be used to create cryptographically secure random data from strong random seed?

One-way cryptographic algorithm with distinct output and verifiable property

I’m working on a API which is serving content based on user requests. What I’d like to achieve is as follows: Having a constant key stored both on the server and the client machine (as a means of identifying a specific user) I’d like to be… Continue reading One-way cryptographic algorithm with distinct output and verifiable property

Why is storing a password hashed more secure than storing it encrypted? [duplicate]

Assuming the hashing includes properly implemented salting and uses a proper password stretching algorithm such as scrypt, and that the encryption algorithm is a secure symmetric algorithm with a random key.
If an attacker gets access to p… Continue reading Why is storing a password hashed more secure than storing it encrypted? [duplicate]

What is the point of storing hashed passwords? If that file is read, doesn’t that mean the computer has already been compromised?

Why is it necessary to store operating system passwords hashed? From what I’ve learned, passwords are stored on the hard drive/SSD in /etc/shadow. However, if a malicious agent was able to get access to this file, doesn’t that mean they ca… Continue reading What is the point of storing hashed passwords? If that file is read, doesn’t that mean the computer has already been compromised?