The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Applied_crypto_2021_fall Alternatives
Similar projects and alternatives to applied_crypto_2021_fall
-
hashcat
World's fastest and most advanced password recovery utility
-
sha256-animation
Animation of the SHA-256 hash function in your terminal.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
applied_crypto_2021_fall reviews and mentions
-
Show HN: SHA-256 explained step-by-step visually
Applied Cryptography (CS-GY 6903) at NYU Tandon. You can find all our programming problem sets in the same repo: https://github.com/oconnor663/applied_crypto_2021_fall.
-
Hashing Is Not Encryption
(shameless plug) If you want to start by doing your own implementation of SHA-256, you can take a look at one of my assignments :) https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
-
The Pinouts Book
> IIRC SHA256 outputs the full state so some types of length extension attack are still possible (though massively less _practical_ than against MD5)
I'm not aware of any differences between the length extension attack on MD5 vs the one on SHA-256. As far as I know, it works the same way on both. Here's an assignment I did on the SHA-256 version if you want a deep dive: https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
It's possible you're thinking about finding collisions? It's true that this is much easier for MD5 than for SHA-256.
-
A note from our sponsor - WorkOS
workos.com | 18 Apr 2024
Stats
The primary programming language of applied_crypto_2021_fall is Python.