Hacker News new | past | comments | ask | show | jobs | submit login

A good example of why a MAC after encryption is also needed. And blocking length extension attacks.



Where do length extension attacks come into play with angecrypt?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: