Replacement for SHA1 (SHA256 or SHA512)

Cees De Groot cdegroot at gmail.com
Tue Oct 11 11:02:36 UTC 2005


On 10/10/05, Patrick Mauritz <oxygene at studentenbude.ath.cx> wrote:
> http://www.venge.net/monotone/docs/Hash-Integrity.html#Hash-Integrity

Thanks for the link. However, I think I get Ron's message here: you
have a business plan or a design document, people are going to review
that (say as part of a due dilligence process by investors), and there
you simply don't want to go into the defensive. So you avoid any
danger areas, and SHA-1 clearly is one of them.

We should probably lend some crypto algo's from VW, they're using
enough Squeak stuff as it is ;-)



More information about the Squeak-dev mailing list