collisions
bao
collisions | bao | |
---|---|---|
22 | 4 | |
2,920 | 452 | |
1.2% | - | |
6.7 | 4.0 | |
about 1 month ago | 2 months ago | |
Python | Rust | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
collisions
- Hash Collisions and Exploitations
-
The Curious Case of MD5
That is still an attack on the second preimage or a collision resistance properties of the hash function. Most collisions do work this way, for example see [1].
[1] https://github.com/corkami/collisions
- Practical advice on finding hash collisions
- GitHub - corkami/collisions: Hash collisions and exploitations - a tool which can manipulate hash quines
-
The Epstein court documents have just been released, over 2000 pages with list of people on that island
it's easy to do if you have a few hours to spare
-
Totális biztonság E-kréta style
remelem nem checksum ellenorzesre https://github.com/corkami/collisions !
-
An open source file Hasher AND Verifier?
Sure, here are two different screenshots of your comment made with this tool:
- Hash collisions and exploitations – Instant MD5 collision
-
Hacker News top posts: Sep 20, 2022
Hash collisions and exploitations – Instant MD5 collision\ (4 comments)
bao
-
The Curious Case of MD5
Thanks! I've added a note about this here: https://github.com/oconnor663/bao/issues/41#issuecomment-119.... Does that sound like an accurate summary to you?
-
Reasons to Prefer Blake3 over Sha256
I mostly agree with you, but there are a couple other bullet points I like to throw in the mix:
- Length extension attacks. I think all of the SHA-3 candidates did the right thing here, and we would never accept a new cryptographic hash function that didn't do the right thing here. But SHA-2 gets a pass for legacy reasons. That's understandable, but we know we need to replace it with something eventually.
- Kind of niche, but BLAKE3 supports incremental verification, i.e. checking the hash of a file while you stream it rather learning whether it was valid at the end of the stream. https://github.com/oconnor663/bao That's useful if you know the hash of a file but you don't necessarily trust the service that's storing it.
-
Lightweight Cryptography Standardization Process: NIST Selects Ascon
Sadly, for domain separation between the Cyclist calls, it needs to touch the capacity, right? So Ascon can’t be retrofitted without being modified. Too bad, it could have enabled bao-style shenanigans.
What are some alternatives?
some-assembly-required - 📖 An approachable introduction to Assembly.
multihash - Self describing hashes - for future proofing
quickhash - Graphical cross platform data hashing tool for Linux, Windows and Mac
BLAKE3 - the official Rust and C implementations of the BLAKE3 cryptographic hash function
jt89 - sn76489an compatible Verilog core, with emphasis on FPGA implementation and Megadrive/Master System compatibility
go-benchmarks - Comprehensive and reproducible benchmarks for Go developers and architects.
EDLA - EDLA remote logic analyser, using ESP32 and Web protocols
BLAKE3-specs - The BLAKE3 paper: specifications, analysis, and design rationale
cipher - Bitcoin wallet generator [Moved to: https://github.com/gocrazygh/btcwallet]
paracosme - Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
git - Git Source Code Mirror - This is a publish-only repository and all pull requests are ignored. Please follow Documentation/SubmittingPatches procedure for any of your improvements.
Hash-Buster - Crack hashes in seconds.