Hacker News new | past | comments | ask | show | jobs | submit login

You can also determine the keyed hash function key if you collect enough plaintexts, which would let you forge authentication tags

https://csrc.nist.gov/csrc/media/projects/block-cipher-techn...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: