Security Cryptography Whatever cover image

Real World: Crypto (2023)

Security Cryptography Whatever

00:00

How to Use a Hash Function to Encrypt Data

The operations you get are like encrypt decrypt squeeze and and like, absorb and squeeze. duplex objects let you combine that into a single state. So basically, like effectively like, shove data in and then get a Mac. And nice, you can squeeze out a key to what's great. I just googled sponge crypto. The first thing is eight. There's a coin called sponge, like a cryptocurrency. And I'm just like, damn it. That's not like horrendous to do or anything.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app