Jump to content

Talk:Secure Hash Algorithms

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Proposed merge with Secure Hash Standard

This article is a non-stub article, and also give brief descriptions to each algorithm, in contrast to the article to be merged/redirected here. NasssaNser (talk/edits) 08:48, 3 April 2017 (UTC)[reply]

You can unscramble the hashes of humanity's 5 billion email addresses in ten milliseconds for $0.0069

Hi

I'm not sure if this is the right article to add this information to, but it seems important https://boingboing.net/2018/04/09/over-the-rainbow-table.html

John Cummings (talk) 07:41, 10 April 2018 (UTC)[reply]

SHA-512 is vulnerable to the length extension attacks?

In the corresponding cell of the table the security against the length extension attack is specified as 0 bits for SHA-512 (and SHA-256). This is highly unusual for actively used crypto hashes. No sources are provided. Pinging @Claw of Slime: who introduced the text (and the table). Dimawik (talk) 22:57, 7 April 2025 (UTC)[reply]