0

I've been reading about SHA-1. I read that SHA-1 is insecure as it uses the Merkle-Damgård construction and the Merkle-Damgård construction is — according to Wikipedia — susceptible to a variety of attacks. However, I have not been able to come up with a single example of how these work.

Can someone give me an example of a length extension attack?

Mike Edward Moras
  • 18,161
  • 12
  • 87
  • 240
Prachi
  • 101
  • 2

0 Answers0