Cryptography Reference
In-Depth Information
The proper way to use synthetic one-way functions like
SHA256 is a fertile topic because of all the recent research
identifying weaknesses in some of the standard designs
like MD5 and SHA-1. While many of the results won't have
much immediate practical effect on some of the tech-
niques used in translucent databases, there's little doubt
that the research could lead to a consistent and useful at-
tack capable of producing useful collisions. Even some of
the more sophisticated tools like the HMAC are suscepti-
ble. [RR08, FLN07, MTMM07]
Search WWH ::




Custom Search