Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Note SHA-256 length extension attack, HMAC, replay attacks #128

Open
david-a-wheeler opened this issue May 25, 2023 · 1 comment
Open

Note SHA-256 length extension attack, HMAC, replay attacks #128

david-a-wheeler opened this issue May 25, 2023 · 1 comment

Comments

@david-a-wheeler
Copy link
Contributor

For more:

@nmav
Copy link

nmav commented Jul 31, 2024

Mentioning that a hash should not be used as a MAC with the length extension attack example aligns with the message of not creating own cryptography when it exists. For message authentication codes, HMAC is good for a historical context, and mentioning the modern MACs such as KMAC - SHA3-based (NIST.SP.800-185), and universal hashes such as poly1305 would make sense.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants