Hacker News new | past | comments | ask | show | jobs | submit login

I think this is answered in the 'Symmetric “Signatures”' section of the Cryptographic Right Answers blog post of 2018.

> Avoid: custom “keyed hash” constructions, HMAC-MD5, HMAC-SHA1, complex polynomial MACs, encrypted hashes, CRC.

https://latacora.micro.blog/2018/04/03/cryptographic-right-a...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: