Course contentsShow
Security
Lesson 213 of 3,0525. Cryptographic Hashing and MACsPro lesson

Length Extension Attacks

Understanding how Merkle-Damgård construction enables length extension attacks and why SHA-3 is immune.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.