This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
This article is a non-stub article, and also give brief descriptions to each algorithm, in contrast to the article to be merged/redirected here. NasssaNser (talk/edits) 08:48, 3 April 2017 (UTC)[reply]
In the corresponding cell of the table the security against the length extension attack is specified as 0 bits for SHA-512 (and SHA-256). This is highly unusual for actively used crypto hashes. No sources are provided. Pinging @Claw of Slime: who introduced the text (and the table). Dimawik (talk) 22:57, 7 April 2025 (UTC)[reply]