Why you should never use hash functions for message authentication

Posted . Visible to the public.

Read the linked article together with this reply Show archive.org snapshot to get an appreciation for why it's a bad idea to roll your own crypto protocol.

Profile picture of Henning Koch
Henning Koch
License
Source code in this card is licensed under the MIT License.
Posted by Henning Koch to makandra dev (2012-06-09 22:05)