Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The pigeonhole principle forbids it, since the hash itself is an ASCII message under 1KB long. Even within your message constraints, the message can contain contain any possible hash, and more besides. Therefore there are more valid messages than hashes.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: