Fingerprint algorithm and SHA-1 usage

Werner Koch wk at gnupg.org
Tue Dec 18 22:02:08 CET 2012


On Tue, 18 Dec 2012 20:52, christian at quelltextlich.at said:

> * It shows people what checking a SHA-512 hash may amount to. Thereby

:-)

>   by hand. But additionally putting a 2D Barcode encoded hash on the
>   slip may do the trick.

And add lots of code which can be used to subvert the whole process.
SHA-384 being the weakest link?  I doubt it.


Shalom-Salam,

   Werner


-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.




More information about the Gnupg-devel mailing list