Why does SHA hash function work like it does?

Why does SHA hash function work like it does? I’m a software developer (not a math PhD) and I got interested to know in more detail how are my hash functions working inside. I for example watched this excellent video lecture by Christof Paar (https://www.youtube.com/watch?v=JIhZWgJA-9o) which explains how SHA-1 works in sufficient detail that I could probably implement it in my favorite programming language as an exercise if I wanted to. But that didn’t explain why the algorithm works like it does. Why for example the compression function does a…

Read More

TPM-FAIL: TPM meets Timing and Lattice Attacks

TPM-FAIL: TPM meets Timing and Lattice Attacks submitted by /u/wolf550e [link] [comments] top scoring links : crypto Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited to encryption of messages such that only the key-holder can read it. Cryptography lives at an intersection of math and computer science. This subreddit covers the theory and practice of modern and *strong* cryptography, and it is a technical subreddit focused on the algorithms and implementations of cryptography.

Read More