Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The most interesting part of this is the section on Length Extension Attack. Implementing SHA256 isn't all that interesting since it's just a mechanistic translation of an algorithm, but the attack shows off one of the implications of how the function works.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: