Date: Thu, 19 Apr 2001 23:46:07 -0400 (EDT) From: Rob Simmons <rsimmons@wlcg.com> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: Tripwire or the like for FreeBSD ? Message-ID: <20010419234434.S86364-100000@mail.wlcg.com> In-Reply-To: <200104200333.XAA44812@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 That is true. Maybe in the interest of lower overhead two algorithms could be used. Drop md5? Robert Simmons Systems Administrator http://www.wlcg.com/ On Thu, 19 Apr 2001, Garrett Wollman wrote: > > > Is there a reason to use md5, sha1, and ripemd160 together? I would think > > ripemd160digest alone would be sufficient. > > Of course. If someone breaks one of the crypto hash algorithms, it is > likely that the discovery will not be immediately applicable to other > algorithms, so the other checksums will still be of some value. > > (Hmmm. I wonder how susceptible these hash algorithms are to quantum > computation...?) > > -GAWollman > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE637EDv8Bofna59hYRAwqxAKCMIv618djie1lLNu2svERd5dseHACcDeFp Gu/gh/I5OVPM4UemRhWpBoU= =lxVG -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010419234434.S86364-100000>