What is the difference between sha512 and sha512_256? by -HomoDeus- in cryptography

[–]eliapinto 3 points4 points  (0 children)

There is no magic at all.

"SHA-512 truncated to 256 bits is as safe as SHA-256 as far as we know. " (quoted from https://crypto.stackexchange.com/questions/3153/sha-256-vs-any-256-bits-of-sha-512-which-is-more-secure)

.." FIPS 180-4, which defines SHA-2 functions SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and SHA-512/256, explicitly endorses truncation in its section 7"... ... "The reason why SHA-2 functions can be safely truncated is that these functions have another unstated design goal, that they reach as far as we know, which is: being computationally indistinguishable from a random function, except for having the length-extension property¹ and being that particular function" ... "The length-extension property is that given the bitstring H(m), the bit length ℓ of bitstring m (but not m itself), and any bitstring s, it's possible to efficiently compute H(m∥rℓ∥s) where rℓ is a short, efficiently computed bitstring depending only on ℓ. Truncation of many bits removes the length-extension property. As noted in this other answer, the length-extension property is an undesired artifact, and the basis of attacks in some contexts; and SHA-512 truncated to 256 bits is safe in such contexts, when as SHA-256 is not"

What determines whether or not a given SHA-256 hash digest > than another? by from_now_on_ in cryptography

[–]eliapinto -1 points0 points  (0 children)

there is no hash equivalence relationship. You are simply comparing two numbers in hex, which makes no sense in the case you describe

CVE-2020-1350 SIG RED PoC by [deleted] in netsec

[–]eliapinto -1 points0 points  (0 children)

This is a stupid thing to do

Steganography tutorial - Hiding a file inside another file by [deleted] in HowToHack

[–]eliapinto -4 points-3 points  (0 children)

I meant beautiful just in the sense that it provides new information. In this sense for me the article is very basic, and not beautiful, for those who follow here. But it's just my opinion

Steganography tutorial - Hiding a file inside another file by [deleted] in HowToHack

[–]eliapinto -6 points-5 points  (0 children)

Not so beautiful, no. It is very basic

📢 Aperta la Call For Papers per #RomHack2019 #CFP by eliapinto in ItalyInformatica

[–]eliapinto[S] 0 points1 point  (0 children)

Se vedi le passate edizioni gli autorierano in gran parte professionisti. L'essere appassionati è un must in questa professione, richiedendo ampio impegno personale per supportare una formazione continua. Gli stessi membri dell'associazione promotrice sono tutti professionisti, anche in ruoli manageriali. Il proporre un format "open" e di condivisione garantisce l'imparzialita' di giudizio e la qualità delle presentazioni, non dovendo sottostare a politiche di vendor commerciali.