TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Sha256 vulnerability for full rounds

16 pointsby gioschalmost 8 years ago

3 comments

jeyalmost 8 years ago
Same thing that&#x27;s explained by <a href="https:&#x2F;&#x2F;crypto.stackexchange.com&#x2F;a&#x2F;48586" rel="nofollow">https:&#x2F;&#x2F;crypto.stackexchange.com&#x2F;a&#x2F;48586</a> ?<p>TLDR: It&#x27;s easy to find fixed points of hashes like SHA-256.
评论 #14655204 未加载
评论 #14655206 未加载
grovegamesalmost 8 years ago
How much of a concern is this? Do we now need to use SHA512 for everything, or is this more of an academic vulnerability that we won&#x27;t see in the wild?
评论 #14655180 未加载
amenghraalmost 8 years ago
It&#x27;s unfortunate that proof.py doesn&#x27;t give an example of a message block that leads from h0 to the q._h constant.<p>I.e. Free-start collisions don&#x27;t let you create two PDFs with the same sha256 hash.