IBM to Provide Security w/o Sacrificing Privacy Using
	Hash	Functions
    Michael B. Trausch 
    fd0man at gmail.com
       
    Wed May 25 09:22:43 CEST 2005
    
    
  
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
Sean C. wrote:
> 
> I'm confused though.
> I just read this article from the New York Times. As a newbie to encryption and
> hash algorithms I thought the idea behind hashes was that you couldn't
> reconstruct the data from the hash.
> 
You can't, but if you have matching data, the hash will match.  For example:
List A:
	- Item 234	sample hash: asdfsdd
	- Bubble 332	sample hash: ef2342h
	- Wonky 093	sample hash: 23jasld
List B:
	- Item 324	sample hash: eja8357
	- Silly 325	sample hash: aj3hht5
	- Item 234	sample hash: asdfsdd
That would be the "match", then they can ask for the data behind the
match to be revealed.
- --
Michael B. Trausch                               <fd0man at gmail.com>
Website: http://fd0man.chadeux.net/     Jabber: mtrausch at jabber.com
Phone: +1-(678)-522-7934              FAX (US Only): 1-866-806-4647
===================================================================
Do you have PGP or GPG?  Key at pgp.mit.edu, Please Encrypt E-Mail!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFClCfDPXInbkqM7nwRAyCtAJ9HVOy087Fsk+ZU3BBbqEu4XtkGTQCbB/kt
bL7t6HAeYG73GwwweHB0sMo=
=h0H5
-----END PGP SIGNATURE-----
    
    
More information about the Gnupg-users
mailing list