Fingerprint algorithm and SHA-1 usage
Werner Koch
wk at gnupg.org
Tue Dec 18 22:02:08 CET 2012
On Tue, 18 Dec 2012 20:52, christian at quelltextlich.at said:
> * It shows people what checking a SHA-512 hash may amount to. Thereby
:-)
> by hand. But additionally putting a 2D Barcode encoded hash on the
> slip may do the trick.
And add lots of code which can be used to subvert the whole process.
SHA-384 being the weakest link? I doubt it.
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
More information about the Gnupg-devel
mailing list