[Tfug] Schneier on Security: The Life Cycle of Cryptographic Hash Functions
Zack Williams
zdwzdw at gmail.com
Tue Jun 21 08:32:50 MST 2011
On Mon, Jun 20, 2011 at 9:30 PM, Angus Scott-Fleming
<angussf at geoapps.com> wrote:
> Definitely worth the click ...
>
> Schneier on Security: The Life Cycle of Cryptographic Hash Functions
> http://www.schneier.com/blog/archives/2011/06/the_life_cycle.html
I wish that the "meaningful collisions" were given in a different
color, because for most of these no meaningful collisions could be
found. By meaningful, I'd mean two files with different but valid
contents, and the same hash.
To uniquely identify a file, a tuple of file size and computed hashes
from a few hash methods would be sufficient even in the face of a
"broken" hash, AFAIK.
- Zack
More information about the tfug
mailing list