Length Extension Attacks
An application is susceptible to a hash length extension attack if it prepends a secret value to a string, hashes it with a vulnerable algorithm, and entrusts the attacker with both the string and the hash, but not the secret. Then, the server relies on the secret to decide whether or not the data returned later is the same as the original data. - Dead Ends in Cryptanalysis #1 / SkullSecurity
Written on October 19, 2020, Last update on October 19, 2020
hash
crypto
security