Cryptography: Difference between revisions
From Wiki
(Create page stub) |
(H(key || message) is vulnerable) |
||
Line 1: | Line 1: | ||
* SHA3 algorithms are currently considered invulnerable to length-extension attacks. | * SHA3 algorithms are currently considered invulnerable to length-extension attacks. | ||
* A naive approach to hash-based MAC generation like taking the hash of the key appended to the message would be vulnerable to length-extension attacks. HMAC isn't. | |||
* Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures. | * Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures. |
Revision as of 15:35, 19 August 2020
- SHA3 algorithms are currently considered invulnerable to length-extension attacks.
- A naive approach to hash-based MAC generation like taking the hash of the key appended to the message would be vulnerable to length-extension attacks. HMAC isn't.
- Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures.