Key Transition Letter 2009-05-21

gpg2.20.maniams at gpg2.20.maniams at
Sun May 24 09:48:24 CEST 2009

Wow Felipe ... WowT

On Sun, May 24, 2009 at 8:38 AM, webmaster at
< at> wrote:

> > As of this writing, no algorithm supported by GnuPG has been
> > compromised.  Even MD5 is still on its feet.
> i don't think this is correct. See:
> felipe
I say Wow here to the simple presentation of the collision and also
forwarding this great piece here. The technical gurus of this board may have
found the above link boring....but a novice like me found it very

I'm looking for similar simple explanations like the above on what a hash
functions is and what algorithms are and what other basics should some one
know before making _their_own_ choice of algos, hash etc

any pointers would be most appreciated

-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20090524/cea19e59/attachment.htm>

More information about the Gnupg-users mailing list