I've been staring at the sha256 algorithm for ages and it only just sunk in that it's basically a block cipher where the encryption key is generated from the plaintext
@SuricrasiaOnline what kind of crypto stuff have you studied?
Awoo.space is a Mastodon instance where members can rely on a team of moderators to help resolve conflict, and limits federation with other instances using a specific access list to minimize abuse.
While mature content is allowed here, we strongly believe in being able to choose to engage with content on your own terms, so please make sure to put mature and potentially sensitive content behind the CW feature with enough description that people know what it's about.
Before signing up, please read our community guidelines. While it's a very broad swath of topics it covers, please do your best! We believe that as long as you're putting forth genuine effort to limit harm you might cause – even if you haven't read the document – you'll be okay!
@confusedcharlot mostly hash functions and attacks on them but I'm also familiar with things like rsa and diffie helman (though not in too concrete detail)