On Wed, Oct 12, 2022 at 03:35:19PM +0200, Richard Levitte wrote:

> Topic: Provider selection and handling for SHA1 and RIPEMD160 should be 
> identical
>        given the current understanding of algorithm specific security issues.

Shouldn't real-world usage be taken into account.  SHA1 is widely used,
and even has important use-cases that aren't going away and where
collision resistance is not a major concern, e.g. NSEC3 in DNSSEC
where it is used for light obfuscation, not cryptographic signing.

I am not aware of any extant protocols that rely on RIPEMD160.  I think
that strictly looking at security margins is misguided, real world usage
needs to inform any such decision, and users should be able to easily
keep SHA1 without bringing RIPEMD160 along for the ride.

-- 
    Viktor.

Reply via email to