Weaknesses in SHA-1

David Shaw dshaw at jabberwocky.com
Tue Sep 28 06:30:22 CEST 2004

On Mon, Sep 27, 2004 at 05:44:11PM -0400, Atom 'Smasher' wrote:
> On Mon, 27 Sep 2004, David Shaw wrote:
> > I think history shows that any uncommon algorithm is going to be used 
> > simply because it's there...
> ===========
> history also shows that a weakness in an encryption primitive is more 
> likely to be discovered ~after~ it becomes popular and widely used.

Absolutely.  Breaking a widely used algorithm gets you interviewed.
Breaking an algorithm that barely anyone uses get you nothing.

Thus, we can guarantee that Tiger is never cracked by not using it. ;)


More information about the Gnupg-users mailing list