SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

Hash length extension attacks exploit a vulnerability in SHA-2 and MD5 hash functions where attackers can append data to authenticated messages without knowing the secret key. The attack works because SHA-2 exposes its internal state in the final hash output, allowing attackers to resume hashing from that point. This

12m watch time

Sort: