On Dec 2, 2007 1:38 PM, Michal 'vorner' Vaner <<a href="mailto:vorner@ucw.cz">vorner@ucw.cz</a>> wrote:<br><div class="gmail_quote"><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
What is more complex, if instead of prowiding:<br>md5: abcd123456<br><br>you provide:<br>md5: abcd12456<br>sda1: bcdef1234<br><br>If one of them does not match, then it is not the file.<br><br>And, of course, you can add sha256, too, if you want. Just any number of
<br>different hash functions. If someone cracks md5, you still have the<br>other one to see it and gives you time to replace md5.<br></blockquote></div><br><br>Let me ask the question the other way around: Why do you want to use a hashing schema which is less secure and requires more effort?
<br><br>And of course you could always provide hashes from all known hash functions currently known to be not broken. Does this really maximize security? Theoretically yes. But in practice you would need to check all hashes in order to benefit because one could be broken in the meanwhile. What if your non-crypto-experts choose the simple way and just check one hash? ('... because I already have
md5.exe installed on my computer') Your hashing schema would give them a much better chance to step into this trap.<br>How often can the weakest point in cryptography be found in osi layer 8 (human)?<br><br>Cheers,<br>
Michael<br>