[Cryptography] SHA-256 decrypted (8 rounds)

Ray Dillinger bear at sonic.net
Tue Apr 2 12:11:27 EDT 2024


On 3/28/24 03:38, McDair via cryptography wrote:
>
> I'm sorry but your basic terminology lesson, however educational, just won't cut it here.

"Here" is a mailing list for technical discussion among cryptographers.

Claims to unilaterally decide the meaning of cryptographic technical 
terms already in long-established use just won't cut it here.


> Encryption in its most general meaning is about protecting secrets. Period. In this context it is not function-type specific.

You are wrong.  You seem to want to make a technical claim.  You need to 
nail this claim down and say exactly what it is, using precise language 
that means exactly one thing.  "General" is not acceptable because 
"General" admits of multiple interpretations. In the context of making a 
technical claim, correct use of exact, well-defined technical terms is 
EXTREMELY function-type specific.

> When you are using the SHA-256 hash function to protect your secret (what you have done here yourself, or in case of password hashing, bitcoin, ...), you are now using the hash function as an encryption tool.
> It is also common terminology in such cases to refer to the hash function input message as 'key'.

A ciphertext produced by encryption must contain the information and 
there must be a decryption operation that will reveal it.

The output of a hash function must not contain the information and must 
give someone no way to recover that information at all.

These operations are different. They are not even analogous. They are 
logical opposites.
Bear
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20240402/e0999c85/attachment.htm>


More information about the cryptography mailing list