On Fri, Apr 24, 2009 at 6:21 PM, Russ Weeks <rwe...@gmail.com> wrote:
> Oscar, your point is well-taken re. the monotonic increase of the
> timestamp.  I guess the timestamp+random data key would have to be run
> through ie. MD5 to make it suitable for consistent hashing, which adds
> another layer of complexity to the collision analysis.

Indeed: once you rehash it, you're back to the birthday problem.  I think a
better approach would be to use a cipher with a fixed and published key and a
blocksize equal to the timestamp.  For instance, DES has a blocksize of 64
bits, so you could use this with a 64 bit timestamp.  This would guarantee
that you had a one-to-one mapping, which may not be the case if you just hash
it.

Best,
-- 
P. Oscar Boykin                            http://boykin.acis.ufl.edu
Assistant Professor, Department of Electrical and Computer Engineering
University of Florida
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to