Comment hash or another hash (Score 1) 84
It isn't much different than storing a password using a hash generator, in any case, it does get interesting in the future when we're faced with entropy systems and one breach of security can cause very unpredictable behavior from the implementation given (casinos for example use self deterministic "automata" and later data to ensure the system is truly entropic rather than the avalanche effects stored password contain.) although authenticity on a network might always need a mnemonic to verify as idiomatic digital computing can be with passphrases and their two-auth structural failures can retrospectively be seen as weak typing... bioinformatics and encrypted sensors seem accessible enough to change cryptography in the future.