Why are hash functions one way? If I know the algorithm, why can’t I calculate the input from it?
Why can’t a password hash be reverse engineered?
I’ve looked into this ages ago and have read lots on it, but I can’t find the explanation of why it can’t be done. An example will make it easier to understand my question and to keep thing…