Why you should never use hash functions for message authentication

Posted . Visible to the public.

Read the linked article together with this reply Show archive.org snapshot to get an appreciation for why it's a bad idea to roll your own crypto protocol.

Henning Koch
License
Source code in this card is licensed under the MIT License.
Posted by Henning Koch to makandra dev (2012-06-09 22:05)