/[gentoo]/xml/htdocs/proj/en/glep/glep-0059.txt
Gentoo

Diff of /xml/htdocs/proj/en/glep/glep-0059.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.1 Revision 1.4
1GLEP: 59 1GLEP: 59
2Title: Manifest2 hash policies and security implications 2Title: Manifest2 hash policies and security implications
3Version: $Revision: 1.1 $ 3Version: $Revision: 1.4 $
4Last-Modified: $Date: 2008/10/21 23:30:47 $ 4Last-Modified: $Date: 2010/01/13 03:26:53 $
5Author: Robin Hugh Johnson <robbat2@gentoo.org>, 5Author: Robin Hugh Johnson <robbat2@gentoo.org>,
6Status: Draft 6Status: Draft
7Type: Standards Track 7Type: Standards Track
8Content-Type: text/x-rst 8Content-Type: text/x-rst
9Requires: 44 9Requires: 44
10Created: October 2006 10Created: October 2006
11Updated: November 2007, June 2008, July 2008 11Updated: November 2007, June 2008, July 2008, October 2008, January 2010
12Updates: 44 12Updates: 44
13Post-History: December 2009
13 14
14Abstract 15Abstract
15======== 16========
16While Manifest2 format allows multiple hashes, the question of which 17While Manifest2 format allows multiple hashes, the question of which
17checksums should be present, why, and the security implications of such 18checksums should be present, why, and the security implications of such
132[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective 133[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective
133 Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, 134 Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive,
134 Report 2004/204. Available online from: 135 Report 2004/204. Available online from:
135 http://eprint.iacr.org/2004/207.pdf 136 http://eprint.iacr.org/2004/207.pdf
136 137
137[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash Functions 138[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash
138 - Application to Cascaded Constructions;" Proceedings of CRYPTO 2004, 139 Functions - Application to Cascaded Constructions;" Proceedings of
139 Franklin, M. (Ed); Lecture Notes in Computer Science 3152, pp. 140 CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science
140 306-316. Available online from: 141 3152, pp. 306-316. Available online from:
141 http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf 142 http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf
142 143
143[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions 144[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions
144 Within a Minute". Cryptology ePrint Archive, Report 2006/105. 145 Within a Minute". Cryptology ePrint Archive, Report 2006/105.
145 Available online from: http://eprint.iacr.org/2006/105.pdf 146 Available online from: http://eprint.iacr.org/2006/105.pdf
171 (ferringb): for being knowledgeable about the Portage Manifest2 172 (ferringb): for being knowledgeable about the Portage Manifest2
172 codebase. 173 codebase.
173 174
174Copyright 175Copyright
175========= 176=========
176Copyright (c) 2006 by Robin Hugh Johnson. This material may be 177Copyright (c) 2006-2010 by Robin Hugh Johnson. This material may be
177distributed only subject to the terms and conditions set forth in the 178distributed only subject to the terms and conditions set forth in the
178Open Publication License, v1.0. 179Open Publication License, v1.0.
179 180
180vim: tw=72 ts=2 expandtab: 181vim: tw=72 ts=2 expandtab:

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.4

  ViewVC Help
Powered by ViewVC 1.1.20