-
Let us say we use P-384 for an ECDSA ecdsa-rdfc-2019. The specification clearly says that SHA-384 must be used to hash the transformed document in the (1) and (2) bullet points of [§ 3.2.4 Hashing](ht…
-
### Is your proposal related to a problem?
We recently introduced new hashing algorithm, and although it feels "semi-experimental" to me at this stage, I think it would be good to document both the…
-
### Hash Generated Using Broken Cryptography API (SHA1)
**Severity:** Medium
**Exploitability:** Difficult
**CVSS:** 4.0
> Note: SocketRocket is being used in my application through react nati…
-
MurmurHash, while relatively fast / dispersive / backwards compatible with Mash, is slower than some newer algorithms. Moving to xxHash should yield a ~2X speed improvement in the hashing portions of …
-
**Describe the issue**
The checksum stage of LFS clean/smudge is a major bottleneck (outset network transfer of course), and with multi-gigabytes of files tracked by LFS, this can lead to prohibitive…
-
### Finding Description
While the application runs, cryptographic APIs are monitored to identify any insecure usage of cryptographic algorithms or primitives.
In this case, insecure cryptographic has…
-
### Finding Description
While the application runs, cryptographic APIs are monitored to identify any insecure usage of cryptographic algorithms or primitives.
In this case, insecure cryptographic has…
-
**Is your feature request related to a problem? Please describe.**
Firstly, we look at the `Hashing` algorithm supports in `Zest_Framework/src/Hashing/
` folder, it only supports the `Bcrypt`, `Ar…
-
Here is a list of hashing algorithms from HashTab 6.0 (without commercial license), you can also see them via click “Option” link:
![1](https://cloud.githubusercontent.com/assets/10364351/19760931/6b…
-
### Hash Generated Using Broken Cryptography API (SHA1)
**Severity:** Medium
**Exploitability:** Difficult
**CVSS:** 4.0
The following code locations within the App use 'CC_SHA1' or 'CryptoKit…