Fingerprint algorithm and SHA-1 usage

Werner Koch wk at
Tue Dec 18 22:02:08 CET 2012

On Tue, 18 Dec 2012 20:52, christian at said:

> * It shows people what checking a SHA-512 hash may amount to. Thereby


>   by hand. But additionally putting a 2D Barcode encoded hash on the
>   slip may do the trick.

And add lots of code which can be used to subvert the whole process.
SHA-384 being the weakest link?  I doubt it.



Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

More information about the Gnupg-devel mailing list