Length Extension Attacks

An application is susceptible to a hash length extension attack if it prepends a secret value to a string, hashes it with a vulnerable algorithm, and entrusts the attacker with both the string and the hash, but not the secret. Then, the server relies on the secret to decide whether or not the data returned later is the same as the original data. - Dead Ends in Cryptanalysis #1 / SkullSecurity

Written on October 19, 2020, Last update on October 19, 2020
hash crypto security