The competition for the next generation of cryptographic hash algorithms has moved on to its second stage. Fourteen candidates have been selected by the US National Institute of Standards and Technology (NIST), which is running the contest, to progress onto the next round in the competition to define the algorithm that will …
What a shame it takes so long
'climax after four years' - not trying very hard are we???
Ms. Hilton certainly would be much faster...
RE: What a shame it takes so long
Obviously a tantric thang. Perhaps Sting is involved?
"Don't stand so close to me" can be interpreted as a warning about the incidence of collisions in hash generation, after all.
Cryptography should be slow
Like programming languages and compilers, you want to take time to vet this stuff. Once its out there, it tends to get stuck.
But this thing is like those...
...Japanese obstacle course competitions. They're grueling as anything, they're time-limited...and most critically, there's no guarantee of a winner. So what happens when, as the deadline looms, it's discovered that NONE of the algorithms are cryptographically safe for the purposes of SHA-3 while all prior algorithms are slowly being picked apart, leaving you with shark fins on both sides of you?
Just as long as...
...my pron can be encrypted safely away from enforcement agencies I'll be happy.
- Vid Google opens Inbox – email for people too thick to handle email
- RUMPY PUMPY: Bone says humans BONED Neanderthals 50,000 years B.C.
- Pic Forget the $2499 5K iMac – today we reveal Apple's most expensive computer to date
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Is your home or office internet gateway one of '1.2 MILLION' wide open to hijacking?