Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This technique is entirely reasonable, although not incredibly efficient. There are several ways of converting between symmetric encryption and authentication; the only reason we talk about using, e.g., AES and SHA256 is that AES is much faster than any block cipher you can build out of SHA256, while SHA256 is much faster than any hash you can build out of AES.


If you use a packaging transform, then this becomes efficient in the use of bandwidth.


Yes, but it's still very inefficient in terms of computation.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: