Note SHA-256 length extension attack, HMAC, replay attacks
Opened this issue · 1 comments
david-a-wheeler commented
nmav commented
Mentioning that a hash should not be used as a MAC with the length extension attack example aligns with the message of not creating own cryptography when it exists. For message authentication codes, HMAC is good for a historical context, and mentioning the modern MACs such as KMAC - SHA3-based (NIST.SP.800-185), and universal hashes such as poly1305 would make sense.