On Wednesday, 15 August 2012 at 14:36:00 UTC, José Armando García Sancio wrote:
Some people's point is that MD5 was consider a cryptographic digest function 16 years ago. It is not consider cryptographically secure today. So why make any design assumption today on how the landscape will look tomorrow? Specially on a field that is always changing. Why not lumped them all together and explain the current situation and
recommendation in the comments.

Looks at Python's passlib module for example. They enumerate every password encoding scheme under the sun (except for scrypt :() and give a recommendation on the appropriate algorithm to use in the current
computing landscape.
http://packages.python.org/passlib/lib/passlib.hash.html#module-passlib.hash

Thanks,
-Jose

I agree that MD5 isn't cryptographically secure anymore, but it was designed as a cryptographic hash algorithm, and it shows. It's statistical and performance proprieties are completely different from CRCs, and no matter how broken, it still has a little of cryptographic strength (no practical preimage attack was found till this date, for example).

Note that in the Python passlib, there is no mention to CRC, FNV, ROT13, etc. Their place is different.

Reply via email to