View Single Post
  #3  
Old 04-11-2024, 20:30
chants chants is offline
VIP
 
Join Date: Jul 2016
Posts: 787
Rept. Given: 42
Rept. Rcvd 50 Times in 31 Posts
Thanks Given: 698
Thanks Rcvd at 1,099 Times in 505 Posts
chants Reputation: 51
Quote:
Originally Posted by Gregory Morse View Post
Is there any protection scheme that uses the CRC32? I mean, any practical application of this for cracking?
I will try to help answer your very notice question in a way you can understand as you seem to be very new to this field.

CRC32 is not a security mechanism, it is an integrity mechanism. Sure bad security implementations by amateurs might do it. Data integrity is done through machine authentication codes or public private key security in a security context.

Its like asking would you use a Mersenne Twister pseudo random number generator as an algo in a security mechanism instead of a cryptographicly secure one. A product you've likely not encountered before called IDA Pro actually did use the MT PRNG for its key generation with 32 bit seeds which made a small state space to search for all possible keys.
Reply With Quote