-
Notifications
You must be signed in to change notification settings - Fork 140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SHA3-256 returns different result from version 52 and 53 #23
Comments
Sorry that the description not clear enough. The test case was attached:
|
Same issue here, any update or migration guide! |
Spongy Castle is a repackage of Bouncy Castle targeted at Android with no substantial difference to the code. The reported issue sounds bad, but it's not a problem that can be solved in Spongycastle unless it's genuinely a consequence of the repackage. Could you first verify that the problem does not occur when executed against Bouncy Castle. If the same problem occurs with BC, you'll need to raise an issue with the BC project to get it fixed - once that fix is released, I can make a fresh release of Spongycastle based on that updated version. |
That is clear, |
So, here is the full story, Bouncy castle followed the standard and updated it implementation to the FIST202 in the version 53, the previous implementation was kept but callable via the "KECCAK-256" algorithm, here his how to call it from the BouncyCastle/SpongyCastle 53 and above:
So developer must pay attention to this point, especially cryptocurrencies and wallet developers, otherwise it will generate different addresses for the same keys. With love from the NEM community. |
Passed same value to SHA3Digest(256), the result is different from version 53 and 52
It caused signature verify failed for those signed with old version.
The text was updated successfully, but these errors were encountered: