1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
SHAKE
a hash function that returns an output of an arbitrary length. SHAKE is fundamentally the same construction as SHA-3, except that it is faster and permutes as much as you want it to permute in the squeezing phase
Producing outputs of different sizes is quite useful
not only to create a digest, but also to create random numbers, to derive keys, and so on.
cSHAKE
is pretty much exactly like SHAKE, except that it also takes a customization string. This customization string can be empty, or it can be any string you want. . A customization string allows you to customize your XOF!
domain separation
different hash functions must be used in order to make a proof work
Scrypt is a
slow-by-design hash function. Its purpose is to take some input data, and create a fingerprint of that data, but to do it very slowly.
Scrypt Properties. Like all hashing functions, scrypt has the following properties
Deterministic (Same input produces the same output every time)
Fixed-size output
Irreversible (By using the output an attacker can’t find the input)
Additionally, Scrypt has the following properties:
Computationally expensive and slow (It takes a long time for a computer to run the hash)
Memory intensive (Potentially several gigabytes of RAM is used to run the hash)
Memory-hard function used in Litecoin, Dogecoin, …
Used for password hashing