Talk:SHACAL

Latest comment: 11 years ago by 68.33.18.33

Below are a few links on cryptanalysis of shacal. I (or anybody!) need to work them in to the article, but I have no time right now.

[[1]] [[2]] [[3]]

What I also find strange, is that the design requirements for a compression function for a hash functions are quite different than those for a block cihper. This is especially strange in light of the fact that no information on the design process of sha is availlable. I wonder if some reputable source out there raises these questions as well?

Sander123 20:55, 15 Aug 2004 (UTC)

According to Dan Boneh's cryptography class on Coursera (https://www.coursera.org/learn/crypto), SHA-2 is based on SHACAL-2 and not the other way around.

68.33.18.33 (talk) 01:32, 28 June 2012 (UTC)Reply