Re: Hash




Pubkeybreaker wrote:
Phil Frisbie, Jr. wrote:
Ernst wrote:

I am learning from the beginning about hash algorithms.
My questions are basic. I am learning.

How does one design a hash algorithm? Is it the work of clever minds or
is there a method?

Actually is is best NOT to design your own hash, and instead use a proven one
that fits your needs.


Yep. Absolutely.

Please let me know when someone succeeds in designing a proven hash.

It depends what are your requirements from hashing. If you're trying
to simulate
a random oracle, then it will never happen: it is widely known that
random oracles
do not exist.

However, there are an increasingly number of papers that are proving
security
without random oracles, and they typically need a collision-resistant
hash function.
In that case, VSH or one of its variants may be a suitable solution.

Scott

.



Relevant Pages

  • Re: [PROPOSAL/PATCH] Fortuna PRNG in /dev/random
    ... was good not to rely *entirely* on the ahsh algorithms. ... The point is that the current random.c design DOES NOT ... RELY on the security of the hash function. ... plaintext that's not one of the two. ...
    (Linux-Kernel)
  • Re: Help creating my own classes...
    ... Hash: SHA1 ... HTML is not a good idea. ... The designer can work on the design part without the fear breaking the ...
    (alt.php)
  • Re: Does this have a flaw in de-biasing an entropy stream?
    ... It takes the same time to build a bad circuit as it does to build a good circuit. ... The best time to stop this is in design time, ... the output to the user should be the output from a hash function ... If the hash function's output is n bits, feed raw data into it until by some estimate the amount of entropy in the raw data has reached n bits or so, then output the hash value, and start again with more raw data. ...
    (sci.crypt)
  • Re: Tenacity should be rewarded
    ... constructed tree, its a hash table and with hash tables, you either ... create a "perfect hash" design or you design the collision handling ... be individually located with the collision handling code. ... Arrrrgh, CUM the REVOLUTION KOMRADE, your assembler coding can be as ...
    (alt.lang.asm)
  • Re: expensive password hash
    ... >>phrase or he will not detect when he guesses the right pass phrase. ... I fail to see how this is done in your design. ... The hash over the buffef full with hashes is used to ... In this design the number of iterations or the time to waste is not ...
    (sci.crypt)