Silly me, I meant to write SHA-256 (I was reading the AES-attack
article that time).

Thanks for pointing that out!


On Mon, Jul 13, 2009 at 11:13 PM, Pablo
Manalastas<[email protected]> wrote:
>
> My GPG 1.4.9 supports the following algorithms:
>
> Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
> Cipher: 3DES (S2), CAST5 (S3), BLOWFISH (S4), AES (S7), AES192 (S8),
>        AES256 (S9), TWOFISH (S10)
> Hash: MD5 (H1), SHA1 (H2), RIPEMD160 (H3), SHA256 (H8), SHA384 (H9),
>      SHA512 (H10), SHA224 (H11)
> Compression: Uncompressed (Z0), ZIP (Z1), ZLIB (Z2), BZIP2 (Z3)
>
> So GPG uses AES256 only for encryption/decryption, and not for computing 
> hashes.  I think SHA256 should work just fine.
>
> //PManalastas
>
>
> --- On Tue, 7/14/09, Ariz Jacinto <[email protected]> wrote:
>
>> From: Ariz Jacinto <[email protected]>
>
>> Hi Pablo,
>>
>> There's a problem with that suggestion since MD5[1] and
>> SHA1[2] are
>> both vulnerable to hash collisions[3]. Try AES-256 :-D
>>
>> [1] http://www.mscs.dal.ca/~selinger/md5collision/
>> [2] http://csrc.nist.gov/groups/ST/hash/statement.html
>> [3] http://en.wikipedia.org/wiki/Collision_%28computer_science%29
>> [4] http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html
>>
>>
>>
>> 2009/7/13 Pablo Manalastas <[email protected]>:
>> > ....We can suggest to Comelec to compute SHA1 or MD5
>> checksums of the approved programs, and at election time,
>> the checksums can be recomputed (manually) and if the
>> original checksum and new checksum agree, then there is no
>> substitution.
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
>
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to