top | item 14459325

(no title)

nialo | 8 years ago

SHA-256 truncated to 224 bits is vulnerable to length extension attacks if the attacker can brute force the remaining 32 bits of the state. Some use cases will make this possible or practical, some will not. It depends on the details of the problem being solved.

discuss

order

No comments yet.