Cryptography

From Wiki
Revision as of 15:41, 19 August 2020 by Joseph (talk | contribs) (Learnt how to do References in MediaWiki)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
  • SHA3 algorithms are currently considered invulnerable to length-extension attacks.
  • A naive approach to hash-based MAC generation like taking the hash of the key appended to the message would be vulnerable to length-extension attacks. HMAC isn't[1].
  • Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures.

References