Weaknesses in SHA-1
dshaw at jabberwocky.com
Tue Sep 28 06:30:22 CEST 2004
On Mon, Sep 27, 2004 at 05:44:11PM -0400, Atom 'Smasher' wrote:
> On Mon, 27 Sep 2004, David Shaw wrote:
> > I think history shows that any uncommon algorithm is going to be used
> > simply because it's there...
> history also shows that a weakness in an encryption primitive is more
> likely to be discovered ~after~ it becomes popular and widely used.
Absolutely. Breaking a widely used algorithm gets you interviewed.
Breaking an algorithm that barely anyone uses get you nothing.
Thus, we can guarantee that Tiger is never cracked by not using it. ;)
More information about the Gnupg-users