SHA-1 Length Extension Attack Demonstration

Поделиться
HTML-код
  • Опубликовано: 18 янв 2025

Комментарии • 3

  • @StefanBoesen
    @StefanBoesen Год назад +2

    Thank you so much for making this video! This is one of the best explanations of a hash length extension attack I've seen and I've been pouring through tons of videos and blog posts trying to wrap my head around it. Will recommend to anyone I know interested in going through CryptoPals where this is one of the challenges (including implementing this attack in code).

  • @lamine333
    @lamine333 8 месяцев назад

    Thanks for this video ! Can you make a video about sha256

    • @DanQ
      @DanQ  8 месяцев назад

      SHA-2's inner workings are somewhat different to SHA-1, but the fundamentals of this video are still completely valid: it slices the message into blocks and hashes each, with the output of each block process becoming an input for the next. The blocks are bigger and what happens within them changes, but that doesn't really affect anything else.
      SHA-3 is a very different beast and is almost-certainly immune to length extension attacks, though.