Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If I remember correctly (I may not), two SHA-2 functions (SHA-224 and SHA-384?) aren't vulnerable to length extension attacks.

While I agree with you that this is an immediately important feature, I don't think Bruce's premise (that SHA-2 is still pretty good) is invalid.

Perhaps like you though, I don't understand why a new standard can't be incremental. I think it's silly to wait until something major happens to change.



The problem with a new standard is that it may induce many to start using it on the grounds that "newer is better", which may not actually be the case: the SHA-2 algorithms have withstood more scrutiny so far.


> If I remember correctly (I may not), two SHA-2 functions (SHA-224 and SHA-384?) aren't vulnerable to length extension attacks.

Interesting, is that because they only return part of the final state (by slicing sha-256 and sha-512) where unsliced 256 and 512 return all of the algorithm's running state as its result?


That's the only reason I can think of why they would be immune to length extension attacks. With SHA-224 one could just brute force the missing 32 bits of state, though.


Yes.

NIST has also specified several other truncated hash functions such as SHA-2-512/256.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: