Decius wrote: ] This isn't going to result in a bunch of practical attacks ] right away, but its time to move to another algorithm. I may have heard some mumbling that the entire class of hashes built on "iterated compression functions" is suspect at this point. Whirlpool, on the other hand, is based on the Rijndael transformation: http://www.memestreams.net/thread/bid14922/ RE: Schneier on Security: SHA-1 Broken |