[Cryptography] SHA-256 decrypted (8 rounds)

McDair mcdair at protonmail.com
Fri Apr 5 06:28:24 EDT 2024


> You are arguing for the right to use incorrect definitions of words rather than arguing for the correctness of your ideas. In doing so you are rejecting the advice and assistance of people who are genuinely trying to help you express your ideas in a form that can even be discussed among professionals.
>
> Arguing for the right to use your own definitions of words, and fighting back against people trying to help you, implies dire things about both the correctness of your ideas and your willingness to express them in a precise way.
>
> Bear

From where I'm standing it's the other way around.

I explained why I used this terminology in code and that it might indeed be confusing with regard to cryptographic hash functions.

I clarified that the usage of 'decrypting' in code actually means finding a preimage.
And that *8 rounds* of SHA-2 actually *has* the same properties of an encryption algorithm, in the way that no data is lost and can be fully retrieved.

But you have chosen to ignore this key factor which is far from professional, let alone helpful.

From this perspective, again while admittingly confusing, the term 'decryption' makes some sense *in case of 8 rounds*, as the method proposed is able to extract the exact input data from the output.

Instead of directing energy toward the content, there is baseless dismissal, cherry-picking, twisting of words and continued hammering on the latter.

Yes, I'm well aware of the differences between cryptographic hash functions and encryption algorithms.
And if I wasn't before, I'd certainly be now.

And there is a difference between what a function is supposed to do versus what it actually does.

McDair
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20240405/325afdd6/attachment.htm>


More information about the cryptography mailing list