Skip to content

Commit

Permalink
Update documentation
Browse files Browse the repository at this point in the history
  • Loading branch information
pdimov committed Nov 11, 2024
1 parent 877f6c9 commit cb685b3
Showing 1 changed file with 4 additions and 3 deletions.
7 changes: 4 additions & 3 deletions doc/hash2/hashing_bytes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -216,7 +216,7 @@ their output one byte at a time. The 32 or 64 bit state is updated for each
input character `ch` by using the operation `state = (state ^ ch) * fnv_prime`.

FNV-1a is non-cryptographic, relatively weak compared to state of the art
hash functions (but good for its class), but fast when the input strings
hash functions (although good for its class), but fast when the input strings
are short.

### xxHash
Expand All @@ -228,7 +228,8 @@ makes it well suited for quick generation of file or data integrity checksums.

### SipHash

https://en.wikipedia.org/wiki/SipHash[SipHash] (https://eprint.iacr.org/2012/351[paper]) has been designed to thwart
https://en.wikipedia.org/wiki/SipHash[SipHash] by Jean-Philippe Aumasson and Daniel J. Bernstein
(https://eprint.iacr.org/2012/351[paper]) has been designed to thwart
https://en.wikipedia.org/wiki/Collision_attack#Hash_flooding[hash flooding attacks] against hash tables that receive
external untrusted input (e.g. HTTP message headers, or JSON objects.)

Expand All @@ -250,7 +251,7 @@ to be the best known and the most widely used https://en.wikipedia.org/wiki/Cryp
but has been broken and is no longer considered cryptographic for any purposes.
It produces a 128 bit digest.

MD5 should no longer be used in new code, except when implementing an existing
MD5 should no longer be used in new code when cryptographic strength is required, except when implementing an existing
specification or protocol that calls for its use.

Prefer SHA2-512/256 (or SHA2-256 in 32 bit code) instead.
Expand Down

0 comments on commit cb685b3

Please sign in to comment.