-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[TODO] review digest-related code, offer stronger hashing algos with a prospect of eventually deprecating SHA1 #34
Comments
Did you perhaps read the part of the README titled Authentication?
|
On 10/05/16 10:37 -0700, Dejan Muhamedagic wrote:
Yes, naturally. I just anticipate a change that will be required in (perhaps distant) For instance, SHA-1 is currently approved for HMAC by NIST: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf but that will likely not last forever (MD5 is not recognized by FIPS Related to that, while booth-keygen does a good job (64 random-enough This is in conflict with the RFC 2104 (sec. 3) recommendation (160 bits Shall we do something about that? Jan (Poki) |
Also, I was made aware there are other (and more performant) keyed hash functions ( |
On Tue, May 10, 2016 at 12:44:07PM -0700, Jan Pokorný wrote:
The user also has an option not to use authentication at all Is there a realistic chance of defeating SHA-1 and inserting Or are you talking about considering some future extension? |
On 12/05/16 09:58 -0700, Dejan Muhamedagic wrote:
Knowingly opting for no authentication at all is perfectly valid for Allowing deliberate weakening of the authentication strength by
I'm not saying SHA-1 is doomed in HMAC context, but there may be
And yes, this is a future prospect to allow alternatives, but that For instance, consider the clumsiness of allowing two implementations Jan (Poki) |
Also |
I doubt that there could ever be a security issue here, but perhaps this is worth considering for marketing purposes. |
This is something that should be resolved in future, even more so when
following is considered:
without strict signalling which one is in use (and hence which
hash algo id to actual algo mapping is applicable)
The text was updated successfully, but these errors were encountered: