UUIDs provide collision-resistant identifiers for distributed systems.
UUID versions
- v1: Timestamp-based (reveals MAC address and creation time).
- v4: Random (most common, cryptographically random).
- v5: Name-based with SHA-1 hashing (deterministic).
- v7: New timestamp-based with improved sorting (RFC draft).
Format
- 8-4-4-4-12 hexadecimal digits: 550e8400-e29b-41d4-a716-446655440000.
Use cases
- Database primary keys in distributed systems.
- Session identifiers and API tokens.
- File and document naming.
- Correlation IDs in microservices.
Security considerations
- UUIDv1 leaks MAC address and timestamp.
- Prefer UUIDv4 for security-sensitive applications.
- Not suitable as secrets or passwords.
Related Articles
View all articlesMDR Vendor Performance Benchmarks: The Metrics That Matter
Only a handful of MDR providers publish detection and response time benchmarks. We compiled every publicly citable metric from CrowdStrike, Expel, Huntress, eSentire, Arctic Wolf, Red Canary, and Microsoft to help you compare vendors on data, not marketing.
Read article →AES vs Classical Ciphers: Why Modern Encryption Actually Works
Understand why AES is unbreakable while Caesar cipher fails instantly. Learn the fundamental differences between classical and modern encryption, and why proper cryptography matters for real security.
Read article →Classical Ciphers Explained: From Caesar to Enigma
Explore the evolution of classical cryptography from ancient Caesar ciphers to the legendary Enigma machine. Learn how each cipher works, their historical significance, and why understanding them matters for modern security.
Read article →How to Identify Unknown Cipher Types in CTF Challenges
Learn systematic techniques for identifying unknown cipher types in CTF competitions. Master frequency analysis, Index of Coincidence, pattern recognition, and other methods to quickly categorize and break encoded messages.
Read article →Explore More Development
View all termsAPI (Application Programming Interface)
A set of rules and protocols that allows different software applications to communicate and exchange data.
Read more →Cron Expression
A time-based job scheduling syntax using five or six fields to specify when tasks should run.
Read more →DevOps
A set of practices combining software development (Dev) and IT operations (Ops) to shorten development cycles and deliver high-quality software continuously.
Read more →Diff Algorithm
A computational method for comparing two sets of data and identifying differences between them.
Read more →GitOps
An operational framework that uses Git repositories as the single source of truth for declarative infrastructure and application configurations.
Read more →JSON (JavaScript Object Notation)
A lightweight data interchange format using human-readable text to represent structured data.
Read more →