What are possible security considerations of using ULID for unique identifiers?

ULID is a specification for unique identifiers which is intended as an alternative to traditional UUID. Some of the major differences are:

The creation date of the identifier is encoded into part of the identifier.
Because of the above, t… Continue reading What are possible security considerations of using ULID for unique identifiers?

Collision probability between truncating vs subsequencing of SHA256 hash to 128 bits?

I am taking a SHA256 hash output in hexadecimal (64 hex nibbles), subsequencing it by taking every other character to make it 32 hex nibbles or 128 bits, and formatting it into a UUID string.
This isn’t being used for security purposes, ma… Continue reading Collision probability between truncating vs subsequencing of SHA256 hash to 128 bits?

Creating a unique password for each device/unit of the same product

We are currently working on an IoT product & having a hard time coming up with a strategy to create a unique password for each device/unit.
I do understand that password based on a function of { serial number, CPU id, MAC address or ti… Continue reading Creating a unique password for each device/unit of the same product