Jump to content

Talk:SHACAL

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Below are a few links on cryptanalysis of shacal. I (or anybody!) need to work them in to the article, but I have no time right now.

[[1]] [[2]] [[3]]

What I also find strange, is that the design requirements for a compression function for a hash functions are quite different than those for a block cihper. This is especially strange in light of the fact that no information on the design process of sha is availlable. I wonder if some reputable source out there raises these questions as well?

Sander123 20:55, 15 Aug 2004 (UTC)

According to Dan Boneh's cryptography class on Coursera (https://www.coursera.org/learn/crypto), SHA-2 is based on SHACAL-2 and not the other way around.

68.33.18.33 (talk) 01:32, 28 June 2012 (UTC)[reply]