With the recent big news about flaws in some fundamental crypto algorithms, I decided to write a Tech Tip that explains the topic in detail from a beginner's point of view, including the ramifications of the discoveries.
This sprung from a discussion in the Broadband Reports Security Forum, where much of the confusion over what this all meant was compounded by a general lack of awareness of the subtleties of how crypto hashes work. I had quite a bit of that unawareness myself before I started writing this.
Unixwiz.net Tech Tip: An Illustrated Guide to Cryptographic Hashes
Corrections and feedback welcome
Comments