Cryptography

From Wiki
Revision as of 17:11, 18 August 2020 by Joseph (talk | contribs) (Create page stub)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
  • SHA3 algorithms are currently considered invulnerable to length-extension attacks.
  • Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures.