SHA-3 is KECCAK
    Kagamin 
    spam at here.lot
       
    Sat Jan 18 05:04:55 PST 2014
    
    
  
On Friday, 17 January 2014 at 15:00:38 UTC, Chris Cain wrote:
> On Friday, 17 January 2014 at 14:06:57 UTC, Kagamin wrote:
>> Doesn't TCP take care of that?
>
> For a packet, yes. In general you can assume that if a transfer 
> completes under TCP then it is very likely correct. That's the 
> way TCP is designed. If you want to check the entire file at 
> the end, MD5 could theoretically be done as a sanity check. I'd 
> still use SHA-2 (in the form of a digital signature, obviously) 
> minimally if your intention is to ensure it hasn't been 
> tampered with
It's hard and expensive to use digital signatures in public 
projects and doesn't protect from tampering. In fact, direct 
tampering in such setup is cheaper than a collision attack, not 
even speaking, that a collision attack doesn't work here, only a 
preimage attack.
    
    
More information about the Digitalmars-d
mailing list