Given a string, returns a unicode hash of the desired length.
The entropy is reflected by how much repetition there is in the resulting hash.
One possible use, if you administer a user database or is creating a web application admin dashboard, is to visually examine how similar password hashes are without viewing the actual password hashes.
Example input and output:
"Several different words lalalalala"
, 16
-> ♥☻☘⇧❤❄תּ☂☢♞✂♻⚡▷☮♥
"hi"
, 16
-> ☭☢☭☢☭☢☭☢☭☢☭☢☭☢☭☢
- Alexander F. Rødseth <[email protected]>
- License: MIT
- Version: 1.0.0