--On 26 September 2011 12:30:48 +0200 Folkert van Heusden 
<[email protected]> wrote:

>>> we'll only do one hash
>>> at the beginning of the connection
>> Hopefully you'll do at least 2, and (if authenticating the other way) 4!
>> But yes.
>
> Why 2/4?

2 because you have to carry out the hash on both ends in order to
compare them.

4 because as I said, you may wish to authenticate server to client,
as well as client to server.

The remark was slightly facetious as even 4 very slow hash operations
would be just fine. It's an O(0) optimisation.

> If you're not sure about the hash collisions, use a hash with more
> bits. E.g. sha512.

I don't think hash collisions have anything to do with it.

-- 
Alex Bligh

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Nbd-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nbd-general

Reply via email to