Monthly Archives: July 2014

A hash function primer II: CRC

Today I will continue the series on hash functions with the cyclic redundancy check (CRC). It is typically used to detect errors in data transmission, but NOT for direct cryptographic applications. For definiteness we’ll consider a popular variant named CRC-32. … Continue reading

Posted in Hash functions | Tagged , , , , | Leave a comment

A hash function primer I: SHA-1

Today I am starting a new series on hash algorithms, beginning with SHA-1. The goal is to review the algorithm and watch a data example being digested. It can be used as a reference and to test your own implementations … Continue reading

Posted in Hash functions | Tagged , , , , | Leave a comment

Creating a password list for WPA/WPA2 dictionary attacks

In this post I will discuss some options of creating your own and most likely unique list of passwords, which can be used for dictionary attacks against certain security setups like WPA. I have to insist that you read and … Continue reading

Posted in Passwords, Security | Tagged , , , , , , , , , , | 1 Comment