Why does SHA hash function work like it does?

Why does SHA hash function work like it does? I’m a software developer (not a math PhD) and I got interested to know in more detail how are my hash functions working inside. I for example watched this excellent video lecture by Christof Paar (https://www.youtube.com/watch?v=JIhZWgJA-9o) which explains how SHA-1 works in sufficient detail that I could probably implement it in my favorite programming language as an exercise if I wanted to. But that didn’t explain why the algorithm works like it does. Why for example the compression function does a…

Read More

TPM-FAIL: TPM meets Timing and Lattice Attacks

TPM-FAIL: TPM meets Timing and Lattice Attacks submitted by /u/wolf550e [link] [comments] top scoring links : crypto Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited to encryption of messages such that only the key-holder can read it. Cryptography lives at an intersection of math and computer science. This subreddit covers the theory and practice of modern and *strong* cryptography, and it is a technical subreddit focused on the algorithms and implementations of cryptography.

Read More

A new consensus approach for DAG-based systems: “The Tangle Multiverse” Hans Moog IOTA foundation

A new consensus approach for DAG-based systems: “The Tangle Multiverse” Hans Moog IOTA foundation IOTA is already working on an approach to solve the scalability trilemma (explanation) with coordicide (coordicide whitepaper). During this research one of IF’s scientists found an alternative approach. Which is more simple. It’s explained in the following two medium articles: Part 1: https://medium.com/@hans_94488/a-new-consensus-the-tangle-multiverse-part-1-da4cb2a69772 Part 2: https://medium.com/@hans_94488/a-new-consensus-the-tangle-multiverse-part-2-b4c971235c59 Sounds like an interesting option for consensus of permissionless ledgers. As stated all feedback and possible attack vectors are welcome. submitted by /u/nstratz [link] [comments] top scoring links : CryptoCurrency…

Read More

Mastercard in a quest to create a #Crypto wallet, Samsung is making a #Crypto wallet for its Galaxy S10 users. The simplicity of the use of #Cryptocurrencies can define the success or failure of the emerging digital asset market.

Mastercard in a quest to create a crypto wallet, Samsung is making a crypto wallet for its Galaxy S10 users. The simplicity of the use of cryptocurrencies can define the success or failure of the emerging digital asset market. submitted by /u/kupwjtdo [link] [comments] top scoring links : CryptoCurrency The official source for CryptoCurrency News, Discussion & Analysis.

Read More

Encode and post videos to internet for browser-based playback with just a URL, use DRM to ensure storage provider can not view or scan the contents of posted video

Encode and post videos to internet for browser-based playback with just a URL, use DRM to ensure storage provider can not view or scan the contents of posted video submitted by /u/galets [link] [comments] top scoring links : crypto Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited to encryption of messages such that only the key-holder can read it. Cryptography lives at an intersection of math and computer science. This subreddit covers the theory and practice of modern and…

Read More