Talk:SHACAL
Latest comment: 28 June 2012 by 68.33.18.33
Template:WikiProject banner shell Below are a few links on cryptanalysis of shacal. I (or anybody!) need to work them in to the article, but I have no time right now.
What I also find strange, is that the design requirements for a compression function for a hash functions are quite different than those for a block cihper. This is especially strange in light of the fact that no information on the design process of sha is availlable. I wonder if some reputable source out there raises these questions as well?
Sander123 20:55, 15 Aug 2004 (UTC)
According to Dan Boneh's cryptography class on Coursera (https://www.coursera.org/learn/crypto), SHA-2 is based on SHACAL-2 and not the other way around.