/[gentoo]/xml/htdocs/proj/en/glep/glep-0059.txt
Gentoo

Diff of /xml/htdocs/proj/en/glep/glep-0059.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.1 Revision 1.3
1GLEP: 59 1GLEP: 59
2Title: Manifest2 hash policies and security implications 2Title: Manifest2 hash policies and security implications
3Version: $Revision: 1.1 $ 3Version: $Revision: 1.3 $
4Last-Modified: $Date: 2008/10/21 23:30:47 $ 4Last-Modified: $Date: 2008/10/28 07:45:44 $
5Author: Robin Hugh Johnson <robbat2@gentoo.org>, 5Author: Robin Hugh Johnson <robbat2@gentoo.org>,
6Status: Draft 6Status: Draft
7Type: Standards Track 7Type: Standards Track
8Content-Type: text/x-rst 8Content-Type: text/x-rst
9Requires: 44 9Requires: 44
10Created: October 2006 10Created: October 2006
11Updated: November 2007, June 2008, July 2008 11Updated: November 2007, June 2008, July 2008, October 2008
12Updates: 44 12Updates: 44
13Post-History:
13 14
14Abstract 15Abstract
15======== 16========
16While Manifest2 format allows multiple hashes, the question of which 17While Manifest2 format allows multiple hashes, the question of which
17checksums should be present, why, and the security implications of such 18checksums should be present, why, and the security implications of such
132[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective 133[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective
133 Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, 134 Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive,
134 Report 2004/204. Available online from: 135 Report 2004/204. Available online from:
135 http://eprint.iacr.org/2004/207.pdf 136 http://eprint.iacr.org/2004/207.pdf
136 137
137[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash Functions 138[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash
138 - Application to Cascaded Constructions;" Proceedings of CRYPTO 2004, 139 Functions - Application to Cascaded Constructions;" Proceedings of
139 Franklin, M. (Ed); Lecture Notes in Computer Science 3152, pp. 140 CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science
140 306-316. Available online from: 141 3152, pp. 306-316. Available online from:
141 http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf 142 http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf
142 143
143[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions 144[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions
144 Within a Minute". Cryptology ePrint Archive, Report 2006/105. 145 Within a Minute". Cryptology ePrint Archive, Report 2006/105.
145 Available online from: http://eprint.iacr.org/2006/105.pdf 146 Available online from: http://eprint.iacr.org/2006/105.pdf

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.3

  ViewVC Help
Powered by ViewVC 1.1.20