PostQuantumCryptogr...
 
Notifications
Clear all

PostQuantumCryptography Algo

13 Posts
6 Users
0 Reactions
997 Views
PaulSanderson
(@paulsanderson)
Honorable Member
Joined: 19 years ago
Posts: 651
 

Droopy has listed a series of implementations along with the algorithms used.

This says to me that someone has implemented an algo badly and that particular implementation of the algo is flawed - not necessarily the algorithm itself (although some have been shown to have weaknesses).


   
ReplyQuote
(@Anonymous 6593)
Guest
Joined: 17 years ago
Posts: 1158
 

I could crack the followings …

But you seem to be mentioning hashing algorithms, not encryption algorithms? Those aren't crackable in the usual sense. You can do a brute force search, but then anyone can do that. (Unless there are flaws, of course. But I don't think there are any known in SHA256 or SHA512 …) I'd go with oclHashcat, myself …

You don't take the MD5 hash of a hard disk drive, and then 'crack' it to reconstruct the hard drive contents.


   
ReplyQuote
(@droopy)
Estimable Member
Joined: 11 years ago
Posts: 136
 

I could crack the followings …

But you seem to be mentioning hashing algorithms, not encryption algorithms? Those aren't crackable in the usual sense. You can do a brute force search, but then anyone can do that. (Unless there are flaws, of course. But I don't think there are any known in SHA256 or SHA512 …) I'd go with oclHashcat, myself …

You don't take the MD5 hash of a hard disk drive, and then 'crack' it to reconstruct the hard drive contents.

Review the list "PGP", etc, those are not hash.
wikipedia.org/wiki/Pretty_Good_Privacy

Try to read the information more closely


   
ReplyQuote
Page 2 / 2
Share: