The Skein hash proposed for SHA-3 boasts some impressive speed results, which I suspect would be applicable for the Threefish block cipher at its heart - but, if Skein is approved for SHA-3, would this imply that Threefish is considered secure as well? That is, would any vulnerability in Threefish imply a vulnerability in SHA-3? (and thu...
Suppose you were at liberty to decide how hashed passwords were to be stored in a DBMS. Are there obvious weaknesses in a scheme like this one?
To create the hash value stored in the DBMS, take:
A value that is unique to the DBMS server instance as part of the salt,
And the username as a second part of the salt,
And create the concat...
Hi
Id like to know that is it possible to use skein instead of MD5 or SHA1 for file integrity checking? How?
Is that really better or faster than SHA1 and MD5?Explain please.
...
The NIST 2nd SHA-3 Candidate Conference was held in late August.
Has there been any news on the SHA-3 competition entrants that came to light at the conference?
...