applied_crypto_2021_fall
problem sets for CS-GY 6903 Applied Cryptography (by oconnor663)
sha256-animation
Animation of the SHA-256 hash function in your terminal. (by in3rsha)
applied_crypto_2021_fall | sha256-animation | |
---|---|---|
4 | 5 | |
39 | 3,314 | |
- | - | |
1.8 | 2.8 | |
over 2 years ago | about 2 months ago | |
Python | Ruby | |
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
applied_crypto_2021_fall
Posts with mentions or reviews of applied_crypto_2021_fall.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-02-07.
-
Show HN: SHA-256 explained step-by-step visually
Applied Cryptography (CS-GY 6903) at NYU Tandon. You can find all our programming problem sets in the same repo: https://github.com/oconnor663/applied_crypto_2021_fall.
-
Hashing Is Not Encryption
(shameless plug) If you want to start by doing your own implementation of SHA-256, you can take a look at one of my assignments :) https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
-
The Pinouts Book
> IIRC SHA256 outputs the full state so some types of length extension attack are still possible (though massively less _practical_ than against MD5)
I'm not aware of any differences between the length extension attack on MD5 vs the one on SHA-256. As far as I know, it works the same way on both. Here's an assignment I did on the SHA-256 version if you want a deep dive: https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
It's possible you're thinking about finding collisions? It's true that this is much easier for MD5 than for SHA-256.
sha256-animation
Posts with mentions or reviews of sha256-animation.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-02-07.
-
[OC] Visualization of all bit operations of SHA-256. (5350x17900 pixels)
One of my favorite SHA256 visualizations is as just a sequence of "ascii art" animations: https://github.com/in3rsha/sha256-animation It doesn't show the overall picture and connections like you do, but each step has a visceral feel to it almost like a physical machine.
- Bitwise left shift - how to do?
-
Bitcoin computes this SHA-256 hash function 200,000,000,000,000,000,000 times EVERY second
Here you go: https://github.com/in3rsha/sha256-animation
-
SHA-256 explained step-by-step visually
This is beautiful, I think this and that other github one are two of my favorite depictions of SHA256.
-
Show HN: SHA-256 explained step-by-step visually
Similar project which visualizes SHA-256 into terminal: https://github.com/in3rsha/sha256-animation
What are some alternatives?
When comparing applied_crypto_2021_fall and sha256-animation you can also consider the following projects:
hashcat - World's fastest and most advanced password recovery utility
iavl - Merkleized IAVL+ Tree implementation in Go