Travis <> writes:
> I'm working on a presentation about cryptography to give to the Open
> Web Application Security Project (OWASP).
> In addition, I'm curious about:
> Which hashes are currently vulnerable to length-extension attacks.  If
> I recall Bruce Schneier's book "Practical Cryptography" correctly, he
> stated that even SHA-1 was vulnerable.  Do any hashes in the SHA-2
> family have protection against length extension?

If you expect to be presenting things at that level of detail to
developers, you're going to lose. There is no chance that they'll
absorb the details, and they'll get entirely the wrong message, which
is that they should be making decisions on such things instead of just
using prepackaged protocols.

The single most important lesson in cryptography is that cryptography
and cryptographic protocols are insanely hard to get right. The
average PHP hacker is not in a position to spend enough time to learn
the field well enough -- he's busy getting his application
working. Much better to avoid the entire issue.


The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to

Reply via email to