Bernd wrote:
> Of course there are colliding files already available and easyly
> generate-able. So a malicous attack is already possible.
I don't believe you. Reference?
> Or at least go with FIPS 180-2.
FIPS 180-2 specifies four secure hash algorithms - SHA-1, SHA-256,
SHA-384, and SHA-512. We're using SHA-1.
I think you meant go with SHA-256, which is new in FIPS 180-2. FIPS
180-1 only had SHA-1. FIPS 180-2 superseded FIPS 180-1, adding three
the algorithms SHA-256, SHA-384, and SHA-512.
--
I won't rest till it's the best ...
Programmer, Linux Scalability
Paul Jackson <[email protected]> 1.650.933.1373, 1.925.600.0401
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]