Photo by Ryan on Unsplash

For Limited Capability Processors … here’s the Pearson Hash

--

Not every computing device is a high-powered process and needs the security of cryptography hashes. In fact, there are more processors that run with 8-bit or 16-bit registers than are with powerful 32-bit or 64-bit registers. So we sometimes need methods that process with 8-bit registers, and so in 1990, Peter K. Pearson published a classic paper [here]:

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.