Talk:SHACAL
Appearance
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||
|
Below are a few links on cryptanalysis of shacal. I (or anybody!) need to work them in to the article, but I have no time right now.
What I also find strange, is that the design requirements for a compression function for a hash functions are quite different than those for a block cihper. This is especially strange in light of the fact that no information on the design process of sha is availlable. I wonder if some reputable source out there raises these questions as well?
Sander123 20:55, 15 Aug 2004 (UTC)
According to Dan Boneh's cryptography class on Coursera (https://www.coursera.org/learn/crypto), SHA-2 is based on SHACAL-2 and not the other way around.
Categories:
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class software articles
- Low-importance software articles
- Start-Class software articles of Low-importance
- All Software articles
- Start-Class Computer Security articles
- Low-importance Computer Security articles
- Start-Class Computer Security articles of Low-importance
- All Computer Security articles
- All Computing articles
- Start-Class Cryptography articles
- Low-importance Cryptography articles
- Start-Class Computer science articles
- Low-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles