Questions tagged [sha2]

sha-2 refers to the family of secure hash functions consisting of SHA-224, SHA-256, SHA-384, and SHA-512. These are defined by the US NIST in FIPS 180-4.

sha-2 refers to the family of secure hash functions consisting of SHA-224, SHA-256, SHA-384, and SHA-512. These are defined by the US NIST in FIPS 180-4.

135 questions
6
votes
1 answer

Objective-C SHA2 hash not working correctly with non-ASCII

I am using xcode and this is my sha512 method: -(NSString*) sha512:(NSString*)input { const char *cstr = [input cStringUsingEncoding:NSUTF8StringEncoding]; NSData *data = [NSData dataWithBytes:cstr length:input.length]; uint8_t…
evanwong
  • 5,054
  • 3
  • 31
  • 44
6
votes
3 answers

What's the state of support for SHA-2 in various platforms?

I read that SHA-1 is being retired from the FIPS 180-2 standard. Apparently there are weaknesses in SHA-1 that led to this decision. Can anyone elaborate on the basis for that decision? Are there implications for the use of SHA-1 in commercial…
Cheeso
  • 189,189
  • 101
  • 473
  • 713
6
votes
2 answers

Does SHA-2 Hashing use a key?

From personal knowledge I know SHA-2 hashes are irreversible and do not use a key. But a person I know has contradicted the above very confidently, I'm now confused and couldn't find the answer I wanted by googling. Can anyone clear me up on this…
Marco
  • 91
  • 1
  • 1
  • 3
5
votes
1 answer

Space & Time Complexity of SHA-2

I am wondering what the space and time complexity of SHA-2 is. I tried looking around, didn't really get a straight forward answer. Can anyone help me out? Thanks very much!
vs9999
  • 61
  • 4
5
votes
2 answers

SHA256 not working even after hotfixes

Ok, so we have a Windows Server 2003 machine with SP2 and both HOTFIX KB 938397 and KB 968730 installed. When we try to use the SHA2 certificates (SHA256) The following things still happen: • Such a certificate can be imported in the certificate…
Jon Koeter
  • 1,005
  • 2
  • 16
  • 25
5
votes
2 answers

Compute blob hash in trigger on blob's table

My environment is Oracle 11g. I have a table T_IMG whose columns are an image blob, an image identifier, and the image's hash computed as SHA256. I want the image hash to be computed and inserted into the T_IMG table every time a row is inserted or…
adim
  • 71
  • 1
  • 5
4
votes
2 answers

Is there an open source alternative to signtool from Microsoft to sign exes with sha2?

We need to sign Windows software with sha2 algorithm but installing signtool seems to be a problem, since I am having difficulties to install the software on my machines. Moreover, I would like to sign the exes on linux. We used to perform the task…
user1102074
  • 59
  • 1
  • 7
4
votes
2 answers

What is the difference between “SHA-2” and “SHA-256”

I'm a bit confused on the difference between SHA-2 and SHA-256 and often hear them used interchangeably. I think SHA-2 a "family" of hash algorithms and SHA-256 a specific algorithm in that family. Can anyone clear up the confusion.
Usman Khawaja
  • 809
  • 14
  • 28
4
votes
1 answer

Site uses SHA-2 but Chrome still warns about weak SHA-1

I have multiple sites secured with SSL. All is from the same provider. At one domain Chrome says: This site uses a weak security configuration (SHA-1 signatures), so your connection may not be private. I tested the domain with ssllabs.com and I…
Tamas Toth
  • 359
  • 6
  • 19
4
votes
1 answer

Storing PBKDF2 Settings Alongside Password

I'm experimenting with PBKDF2 for my passwords right now, and it dawned on me that if I were to ever upgrade to a faster machine in the future, I would want to increase the number of PBKDF2 iterations. However, this would invalidate all the current…
Huy T
  • 1,273
  • 1
  • 11
  • 21
4
votes
3 answers

MySQL SHA2 function does not appear to work

I'm using MySql 5.5.32 and trying to reproduce some code in a stored procedure that we have in the business layer so I can set passwords for people using sql. It appears that there is something wrong with the SHA2 function though, but maybe I'm…
bpeikes
  • 3,495
  • 9
  • 42
  • 80
4
votes
1 answer

Cannot get Tomcat JDBCRealm to use SHA2

I am using Tomcat 7 / JDBCRealm authentication in clear text (development/controlled environment). Now I want to upload the web app to my hosted environment so I need to digest the passwords. I added 'digest="MD5"' to the realm section in…
adaj21
  • 543
  • 3
  • 11
  • 25
3
votes
2 answers

Is truncating sha2/sha3 to 16 bytes worse than using crc32 which itself gives 16 bytes to begin with?

I am using AES128 in CBC mode, and I need a 16-byte key, so I was wondering if using sha2 or sha3 and then truncating it to 16 bytes (take first 16 bytes from the left) would make sha2/sha3 weaker than crc32 which gives me 16 bytes out of the box.
NS studios
  • 149
  • 14
3
votes
1 answer

How to convert a hex decimal column in scala to int

I tried to use conv function as I saw in some examples, but is not working for me. I don't understand why this function returns the same value in the column of my DF. I was using spark2.1 with scala 2.11.11, and then I tried with spark 2.2 and scala…
3
votes
3 answers

Difference between android sha224 and python sha224

For an application prototype I'm creating a simple user login. The Password of the user will then be hashed using sha224 and transferred to the back-end. The Problem I am facing right now is the following. The password that was stored in the DB…
philgiese
  • 623
  • 1
  • 7
  • 17
1
2
3
8 9