-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
> IIRC SHA256 outputs the full state so some types of length extension attack are still possible (though massively less _practical_ than against MD5)
I'm not aware of any differences between the length extension attack on MD5 vs the one on SHA-256. As far as I know, it works the same way on both. Here's an assignment I did on the SHA-256 version if you want a deep dive: https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
It's possible you're thinking about finding collisions? It's true that this is much easier for MD5 than for SHA-256.
Related posts
-
Create an AI prototyping environment using Jupyter Lab IDE with Typescript, LangChain.js and Ollama for rapid AI prototyping
-
Show HN: FileKitty – Combine and label text files for LLM prompt contexts
-
Effortlessly Create an AI Dungeon Master Bot Using Julep and Chainlit
-
An Exploration of Software-defined networks in video streaming, Part Three: Performance of a streaming system over a SDN
-
Clasificador de imágenes con una red neuronal convolucional (CNN)