Link l
![IMG_1120|690x275]
Got motivated about hashing algorithms after seeing a post with multiple kali Linux SHA256 hashes. Found this paper by Mario Lambeger & Florian Mendel, They use a second-order differential Attack on a SHA256 to minimize its steps of the algorithm. Is this type of simulation feasible or something we could do with kali Linux? or is kali Linux more geared for network/security purposes?
I’m new here, and looking to go full tilt into just about everything. Any advice, tips, or constructive criticism, about this field is greatly appreciated
Thanks!
[Higher-Order Differential Attack on Reduced SHA-256](https://eprint.iacr.org/2011/037.pdf The )