| ▲ | sowbug 2 hours ago | |
This entire thread should be annihilated, but since you mentioned being pedantic... You're correct that a pure encryption algorithm doesn't use hashing. But real-world encryption systems will include an HMAC to detect whether messages were altered in transit. HMACs do use hash functions. | ||