Re: compare-by-hash (was Re: sharing /etc/passwd)

看板FB_security作者時間21年前 (2004/09/28 23:21), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串11/16 (看更多)
On Tue, Sep 28, 2004 at 12:14:05PM +0300, Giorgos Keramidas wrote: > There is one difference between ``looking for collisions'' and being > bitten by undetected collisions though. > > If the probability of a collision just happening with random user data > is 1/(2^128) we can't be sure that it will necessarily take the > transfer of an average number of 2^127 blocks before a collision > happens. You might get one at the very first pair of blocks and then > no collisions ever after until the Sun burns out. > > Using two different hashes for the same set of input data, which David > G. Andersen proposed, seems like a nice idea though. If you buy the "logic" of the paper, this would not make much difference. After all, composing two hashes just gives you another hash with a longer bit length. This paper needs a lot more peer review, although I'm not sure that many take it seriously enough to bother. Cheers, -- Jacques A Vidrine / NTT/Verio nectar@celabo.org / jvidrine@verio.net / nectar@FreeBSD.org _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #11MO5q00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #11MO5q00 (FB_security)