Penguin
Diff: CryptographicHash
EditPageHistoryDiffInfoLikePages

Differences between version 10 and predecessor to the previous major change of CryptographicHash.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 10 Last edited on Saturday, February 28, 2009 4:52:55 pm by LawrenceDoliveiro Revert
Older page: version 9 Last edited on Sunday, July 25, 2004 4:07:51 am by AristotlePagaltzis Revert
@@ -1,10 +1,12 @@
 A CryptographicHash is a [Hash] for which is it is practically impossible to construct a document that results in a hash value known beforehand. This makes such hash functions useful for signing documents to assure their integrity. Several well known and understood algorithms fall in this category: 
  
-* [ MD2] as per RFC:1319, a good but slow hashing algorithm  
-* [ MD4] as per RFC:1320  
-* [MD5] as per RFC:1321, based on [ MD2] but faster  
-* [SHA1] is newer and has fewer theoretical attack vectors than [ MD5] 
+* MD2 as per RFC:1319, a good (still?) but slow hashing algorithm  
+* MD4 as per RFC:1320  
+* [MD5] as per RFC:1321, based on MD2 but faster. People should be phasing out their use of this by now.  
+* [SHA1] is newer and has fewer theoretical attack vectors than MD5, but is also [showing signs of weakness|http://www.schneier.com/blog/archives/2005/02/sha1_broken.html ].  
+  
+A [competition is currently in progress|http://www.schneier.com/blog/archives/2007/02/a_new_secure_ha.html] to come up with a new, stronger hash function to replace the above.  
  
 See also: [CRC] 
 ---- 
 CategoryCryptography