We all have used Cryptographic algorithms to Secure our data and passwords.
But are they all completely secure?
Let's see for the two most common ones
SHA2 (256, 512, 224, 384)
This family of hash functions relies on sounds and numbers to create a checksum value. The resultant checksums are vulnerable to length extension attacks, which involve a hacker reconstructing the internal state of a file by learning its hash digest.
Public attacks on SHA-2 have been happening since 2008. Just like what happened with SHA-1, the attacks against SHA-2 have been getting increasingly better and weakening SHA-2 over time. Some attacks have SHA-2’s effective protection down to 237. Some of the latest attacks, publicly announced in 2016, consider SHA-2 attacks to already be “practical”.
MD5
This hash function creates a checksum value, but each data will not necessarily have a unique hash, so it is open to vulnerabilities if a hacker swaps out some data with the same checksum value.
Desired hash with a different plaintext can be generated maliciously in MD5.
So we are not that safe as we thought to be...
To Know More Visit:
Top comments (0)