top | item 22842440

(no title)

bascule | 5 years ago

If you use an unkeyed hash (as opposed to a PRF) on low-entropy inputs, they can be preimaged by an attacker.

This is especially problematic in the case of PII like email address/phone number

discuss

order

No comments yet.