[Tfug] Schneier on Security: The Life Cycle of Cryptographic Hash Functions

Zack Williams zdwzdw at gmail.com
Tue Jun 21 08:32:50 MST 2011


On Mon, Jun 20, 2011 at 9:30 PM, Angus Scott-Fleming
<angussf at geoapps.com> wrote:
> Definitely worth the click ...
>
> Schneier on Security: The Life Cycle of Cryptographic Hash Functions
> http://www.schneier.com/blog/archives/2011/06/the_life_cycle.html

I wish that the "meaningful collisions" were given in a different
color, because for most of these no meaningful collisions could be
found.   By meaningful, I'd mean two files with different but valid
contents, and the same hash.

To uniquely identify a file, a tuple of file size and computed hashes
from a few hash methods would be sufficient even in the face of a
"broken" hash, AFAIK.

- Zack




More information about the tfug mailing list