> I suggest we use SHA512 truncated to 6 bytes, and prefixed by the > first 6 bytes of the sender's public key. To create a fraudulent > certificate an attacker would have to find a double collision.
Very good idea, I agree with this entirely.
_______________________________________________ zeromq-dev mailing list [email protected] http://lists.zeromq.org/mailman/listinfo/zeromq-dev
