Changes between Version 23 and Version 24 of NewMutableEncodingDesign
- Timestamp:
- 2012-01-11T21:54:46Z (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
NewMutableEncodingDesign
v23 v24 74 74 Adding 2 metadata characters and a clear separator gives us: 75 75 76 * 178 {{{lafs:DW-3zusfONRfEOp17B0ad2TDDSJxtBpvH}}}77 * 256: {{{lafs:DR -fZeioazoWrO62reiAjzUAyV0uz3ssh6Hnanv8cKMClY}}}78 * 306: {{{lafs:DR -2s1SqUbf8fpsh6HnThRqTUtBpvH7D8fpWEDSfZeioazoWrO62rei}}}79 * 384: {{{lafs:DV -3a31SqUbf8fpWE1opRCT3coDhRqTU7bDU2AvC3RQJBu6ZNFhVscyxA9slYtPVT79x}}}76 * 178: {{{lafs:DW/3zusfONRfEOp17B0ad2TDDSJxtBpvH}}} 77 * 256: {{{lafs:DR/fZeioazoWrO62reiAjzUAyV0uz3ssh6Hnanv8cKMClY}}} 78 * 306: {{{lafs:DR/2s1SqUbf8fpsh6HnThRqTUtBpvH7D8fpWEDSfZeioazoWrO62rei}}} 79 * 384: {{{lafs:DV/3a31SqUbf8fpWE1opRCT3coDhRqTU7bDU2AvC3RQJBu6ZNFhVscyxA9slYtPVT79x}}} 80 80 81 81 [comment:44:ticket:217 #217:c44] says that, if we don't need to prevent collisions, then we can use a K-bit hash for K-bit second-pre-image resistance. However, see [comment:6:ticket:882 #882:c6] for a counterargument saying that 50 extra bits or so are needed to be secure against multi-target attacks (i.e. T = 50). This page has now been updated assuming the counterargument is correct.