27 Aug
2010
27 Aug
'10
3:52 a.m.
On 08/26/2010 04:41 PM, Mike Abbott wrote:
- What hash algorithm to use?
- Should I add support for trusting hash uniqueness
Use two hash functions and concatenate the hashes. While both hash systems may eventually be hacked it is unlikely that hacking them will result in a targeted alias.
Just make it possible to change the hash in the future. Have a utility that updates all (or a subset) of them.
If e.g. SHA256 is truly broken in the future, the utility can run overnight while I fix the million other emergencies that are about to exist in the morning.