Skip to main content

Questions tagged [sha-2]

SHA-2 is a family of cryptographic hash functions designed by the NSA and published by NIST in 2001. The family includes various output lengths (224, 256, 384, and 512 bits).

0 votes
1 answer
178 views

In light of the assumed arrival of CRQC's NIST appears to no longer recommend SHA256 as a collision resistant hash. I have been unable to find something definitive on the subject of how a 256-bit hash ...
johnwalker's user avatar
0 votes
2 answers
91 views

I'm wondering what would be any major flaw of a simple Encryption algorithme based on Hash fonction like SHA: The algorithm is: Use SHA on a password and then keep hashing the output to concatenate a ...
Brandonn's user avatar
0 votes
0 answers
43 views

for instance SHA2-512, İs it overkill to use currently?
xdd's user avatar
  • 1
3 votes
3 answers
1k views

SHA-2 makes use of non-ARX non-linear operators such as the Choice and Majority functions: \begin{align} \mathsf{Ch}(E,F,G) &= (E \wedge F) \oplus (\neg E \wedge G)\\ \mathsf{Ma}(A, B, C) &= (...
LightTunnelEnd's user avatar
2 votes
1 answer
412 views

I came across the Solana network utilizing sha256 as a "proof of history". They are using it as a pseudo-VDF (verifiable delay function). The reason it's pseudo is because verification is ...
LightTunnelEnd's user avatar
-1 votes
1 answer
549 views

In the steps of “Append the padding bits” in SHA-512 system, the message is padded so that its length is congruent to 896 mod 1024. I'm new to cryptography and I can't figure out the difference ...
SIDI's user avatar
  • 9
1 vote
0 answers
196 views

When I look up who developed SHA-2 family, the result I get is along the lines of SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard. ...
Josh's user avatar
  • 145
5 votes
1 answer
986 views

I was reading the Wikipedia page for SHA-256 (SHA-2) and came across the following statement: For a hash function for which $L$ is the number of bits in the message digest, finding a message that ...
Hera Sutton's user avatar
4 votes
1 answer
670 views

Does anybody know or can point me to a source about SHA2 vs SHA3 usage statistics. SHA3 is newer and is claimed to be more secure but ... is it more widely used in real life deployments?
user104734's user avatar
1 vote
1 answer
2k views

Assume I create a hash using SHA-256 and then take only the first 160 bits of the hash, as the result. is the result more cryptographically secured than SHA-1? Or are the two algorithms equally secure ...
Aviv Aviv's user avatar
  • 113
3 votes
1 answer
134 views

I was recently trying to gain a better understanding of the SHA-512/256 algorithm and on this NIST example they use the word "abc" as the input. In the Block Contents, it shows the expected ...
Jack O'Leary's user avatar
2 votes
0 answers
182 views

After a bit of research, I finally understand what's the step by step algorithm of SHA-2 (however, of course, I won't remember it myself). But I don't understand what's the idea behind it. Did the ...
Wynell's user avatar
  • 121
0 votes
0 answers
73 views

I was reading how bitcoin uses sha2 I understand how sha2 works procedurally (i.e. https://qvault.io/cryptography/how-sha-2-works-step-by-step-sha-256/), but I have no clue why it works. Steps like s0 ...
user avatar
0 votes
1 answer
750 views

I have been playing with SHA-2-256 in Julia and I noticed that the hashes produced don't appear to follow a uniform distribution. My understanding of secure hashing algorithms is that they should ...
Bob's user avatar
  • 11
10 votes
3 answers
9k views

Why are SHA3 algorithms considered more secure than their SHA2 counterparts? Surely in part, it is due to their resistance to length extension attacks. But specifically, when considering collision ...
Arturo Roman's user avatar

15 30 50 per page
1
2 3 4 5
10