iavl
applied_crypto_2021_fall
iavl | applied_crypto_2021_fall | |
---|---|---|
1 | 4 | |
407 | 39 | |
0.7% | - | |
8.2 | 1.8 | |
4 days ago | over 2 years ago | |
Go | Python | |
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
iavl
applied_crypto_2021_fall
-
Show HN: SHA-256 explained step-by-step visually
Applied Cryptography (CS-GY 6903) at NYU Tandon. You can find all our programming problem sets in the same repo: https://github.com/oconnor663/applied_crypto_2021_fall.
-
Hashing Is Not Encryption
(shameless plug) If you want to start by doing your own implementation of SHA-256, you can take a look at one of my assignments :) https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
-
The Pinouts Book
> IIRC SHA256 outputs the full state so some types of length extension attack are still possible (though massively less _practical_ than against MD5)
I'm not aware of any differences between the length extension attack on MD5 vs the one on SHA-256. As far as I know, it works the same way on both. Here's an assignment I did on the SHA-256 version if you want a deep dive: https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
It's possible you're thinking about finding collisions? It's true that this is much easier for MD5 than for SHA-256.
What are some alternatives?
hashcat - World's fastest and most advanced password recovery utility
tendermint - ⟁ Tendermint Core (BFT Consensus) in Go
sha256-animation - Animation of the SHA-256 hash function in your terminal.
lnd - Lightning Network Daemon ⚡️
image-stego - 🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on its own.