> I suggest we use SHA512 truncated to 6 bytes, and prefixed by the
> first 6 bytes of the sender's public key. To create a fraudulent
> certificate an attacker would have to find a double collision.

Very good idea, I agree with this entirely.
_______________________________________________
zeromq-dev mailing list
[email protected]
http://lists.zeromq.org/mailman/listinfo/zeromq-dev

Reply via email to