SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile
This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).
Hash length extension attacks exploit a vulnerability in SHA-2 and MD5 hash functions where attackers can append data to authenticated messages without knowing the secret key. The attack works because SHA-2 exposes its internal state in the final hash output, allowing attackers to resume hashing from that point. This
•12m watch time
Sort: