DEV Community

Cover image for Vulnerabilities in Cryptographic Algorithms
Tanmay Khatri
Tanmay Khatri

Posted on

1

Vulnerabilities in Cryptographic Algorithms

We all have used Cryptographic algorithms to Secure our data and passwords.
But are they all completely secure?
Let's see for the two most common ones

SHA2 (256, 512, 224, 384)

This family of hash functions relies on sounds and numbers to create a checksum value. The resultant checksums are vulnerable to length extension attacks, which involve a hacker reconstructing the internal state of a file by learning its hash digest.

Public attacks on SHA-2 have been happening since 2008. Just like what happened with SHA-1, the attacks against SHA-2 have been getting increasingly better and weakening SHA-2 over time. Some attacks have SHA-2’s effective protection down to 237. Some of the latest attacks, publicly announced in 2016, consider SHA-2 attacks to already be “practical”.

MD5

This hash function creates a checksum value, but each data will not necessarily have a unique hash, so it is open to vulnerabilities if a hacker swaps out some data with the same checksum value.

Desired hash with a different plaintext can be generated maliciously in MD5.


So we are not that safe as we thought to be...

To Know More Visit:

  1. Know about Checksums
  2. ISC2 Community
  3. Stack Exchange

Heroku

Simplify your DevOps and maximize your time.

Since 2007, Heroku has been the go-to platform for developers as it monitors uptime, performance, and infrastructure concerns, allowing you to focus on writing code.

Learn More

Top comments (0)

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs

👋 Kindness is contagious

Please leave a ❤️ or a friendly comment on this post if you found it helpful!

Okay