Thank you so much for making this video! This is one of the best explanations of a hash length extension attack I've seen and I've been pouring through tons of videos and blog posts trying to wrap my head around it. Will recommend to anyone I know interested in going through CryptoPals where this is one of the challenges (including implementing this attack in code).
SHA-2's inner workings are somewhat different to SHA-1, but the fundamentals of this video are still completely valid: it slices the message into blocks and hashes each, with the output of each block process becoming an input for the next. The blocks are bigger and what happens within them changes, but that doesn't really affect anything else. SHA-3 is a very different beast and is almost-certainly immune to length extension attacks, though.
Thank you so much for making this video! This is one of the best explanations of a hash length extension attack I've seen and I've been pouring through tons of videos and blog posts trying to wrap my head around it. Will recommend to anyone I know interested in going through CryptoPals where this is one of the challenges (including implementing this attack in code).
Thanks for this video ! Can you make a video about sha256
SHA-2's inner workings are somewhat different to SHA-1, but the fundamentals of this video are still completely valid: it slices the message into blocks and hashes each, with the output of each block process becoming an input for the next. The blocks are bigger and what happens within them changes, but that doesn't really affect anything else.
SHA-3 is a very different beast and is almost-certainly immune to length extension attacks, though.