Well, it seems like you've done more research on this than I have.  :-) 
I was just raising the thought.  I'm glad that you have checked up on
this.  I stand corrected.

For my project, I am probably going to keep using SHA256 because it's
already there, and because I think it is more future proof.  But it's
nice to be able to still keep things simple for the common case.

Thanks for the info!

Krys

[EMAIL PROTECTED] wrote:

>by broken, you mean collision ? It only affects it as a content
>hash(theoretically), say for source distribution(even that is remote as
>the altered content may become meaningless, failed to compile etc.) but
>in general safe for this kind of password usage, if my reading about
>the paper is right.
>
>
>  
>

Reply via email to