Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think the point was that if some dumb protocol were misusing HMAC (and I'm not good enough at thinking about protocols to imagine how it might do so), it could be vulnerable to collisions generated this way.


The point of the parent commenter is that a misuse of HMAC that gives attackers knowledge of the key admits much simpler attacks than this.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: