[Cryptography] SHA-256 decrypted (8 rounds)
Ray Dillinger
bear at sonic.net
Tue Apr 2 12:11:27 EDT 2024
On 3/28/24 03:38, McDair via cryptography wrote:
>
> I'm sorry but your basic terminology lesson, however educational, just won't cut it here.
"Here" is a mailing list for technical discussion among cryptographers.
Claims to unilaterally decide the meaning of cryptographic technical
terms already in long-established use just won't cut it here.
> Encryption in its most general meaning is about protecting secrets. Period. In this context it is not function-type specific.
You are wrong. You seem to want to make a technical claim. You need to
nail this claim down and say exactly what it is, using precise language
that means exactly one thing. "General" is not acceptable because
"General" admits of multiple interpretations. In the context of making a
technical claim, correct use of exact, well-defined technical terms is
EXTREMELY function-type specific.
> When you are using the SHA-256 hash function to protect your secret (what you have done here yourself, or in case of password hashing, bitcoin, ...), you are now using the hash function as an encryption tool.
> It is also common terminology in such cases to refer to the hash function input message as 'key'.
A ciphertext produced by encryption must contain the information and
there must be a decryption operation that will reveal it.
The output of a hash function must not contain the information and must
give someone no way to recover that information at all.
These operations are different. They are not even analogous. They are
logical opposites.
Bear
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20240402/e0999c85/attachment.htm>
More information about the cryptography
mailing list