Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement other hash functions and ciphers #49

Closed
mukrop opened this issue May 21, 2013 · 4 comments
Closed

Implement other hash functions and ciphers #49

mukrop opened this issue May 21, 2013 · 4 comments

Comments

@mukrop
Copy link
Member

mukrop commented May 21, 2013

SHA-1, SHA-2, MD5, RC-4

@Bender250
Copy link
Collaborator

RC-4 done, but as it is not round based, we cannot reduce it now.

Others are nice to have :).

@Bender250
Copy link
Collaborator

Bender250 commented Mar 19, 2017

Randomness of the RC-4 can be reduced by column stream. @sysox: can you give me tips, what column should be insecure on RC-4?

@ph4r05
Copy link
Member

ph4r05 commented Mar 20, 2017

@Bender250 Syso already round reduced MD5m do you have it?
We also have SHA256

@sysox
Copy link
Contributor

sysox commented Mar 20, 2017

Each 16 Bytes generated for different keys were weak as analyzed by Polynomials. Literature says second byte is biased but we have found different pattern.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants