To be fair, I didn't notice message extension attacks because AWS used an HMAC -- not a hash function -- and thus wasn't vulnerable.
crypto primitives are radioactive. You are not going to get them right
It doesn't take an expert cryptographer to know that if you want a MAC you should use a MAC.
To be fair, I didn't notice message extension attacks because AWS used an HMAC -- not a hash function -- and thus wasn't vulnerable.
crypto primitives are radioactive. You are not going to get them right
It doesn't take an expert cryptographer to know that if you want a MAC you should use a MAC.