-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thoughts? It wasn't the algorithm I had anticipated, but does anyone
really anticipate this seeing any wide spread adoption without a huge
delay in between?
//landon
- Original Message
Subject: NIST Selects Winner of Secure Hash A
t all just been highly intuitive guesswork? It doesn't have to
be period sensitive, anything from Caesar to the recent would be helpful.
Regards,
Landon Hurley
- --
Violence is the last refuge of the incompetent.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: U
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
That's why I suggested clientside use, and reasoned that it could all even be
used plaintext instead of hashes, instead of the old password being kept
compromised server side, have it drawn when the user enters it to change the
password.
Someone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
GSM and the Kaos club expert would be a good example. So would the recent $200
hardware break of hdmi encryption.
Steven Bellovin wrote:
>Does anyone know of any (verifiable) examples of non-government enemies
>exploiting flaws in cryptography?