|
|
Line 1: |
Line 1: |
| {{about|the cryptographic hash function|the Egyptian pharaoh|Sneferu}}
| | Gabrielle is what her spouse loves to call a though she doesn't [http://search.Usa.gov/search?query=totally totally] like being called in that way. As a woman what your sweetheart really likes is [http://Dict.leo.org/?search=mah+jongg mah jongg] but she by no means made a dime by using it. Software achieving is where her important income comes from so soon her husband as well as a her will start specific own business. For a while she's not long ago in Massachusetts. Go to her website to unearth out more: http://prometeu.net<br><br>Feel free to visit my web site :: clash of clans hack android ([http://prometeu.net Going Listed here]) |
| '''Snefru''' is a [[cryptographic hash function]] invented by [[Ralph Merkle]]
| |
| in 1990<ref>{{cite journal |author=[[Ralph C. Merkle]] |journal=[[Journal of Cryptology]] |volume=3 |issue=1 |pages=43–58 |year=1990 |title=A fast software one-way hash function J. Cryptology |doi=10.1007/BF00203968 |url=http://www.springerlink.com/content/t10683l407363633/ |accessdate=2011-04-06 }}</ref>
| |
| which supports 128-bit and 256-bit output. It was named after the [[Ancient Egypt|Egyptian]] [[Pharaoh]] [[Sneferu]], continuing the tradition of the [[Khufu and Khafre#Khufu|Khufu]] and [[Khufu and Khafre#Khafre|Khafre]] [[block cipher]]s.
| |
| | |
| The original design of Snefru was shown to be insecure by [[Eli Biham]] and [[Adi Shamir]] who were able to use [[differential cryptanalysis]] to find hash collisions. The design was then modified by increasing the number of iterations of the main pass of the algorithm from two to eight. Although differential cryptanalysis can break the revised version with less complexity than [[brute force attack|brute force search]] (a certificational weakness), the attack requires <math>2^{88.5}</math> operations and is thus not currently feasible in practice.<ref>{{cite paper |author=[[Eli Biham]] |date=2008-07-19 |title=New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru |publisher=Springer Berlin/Heidelberg |url=http://www.springerlink.com/content/208q118x13181g32/ }}</ref>
| |
| | |
| ==References==
| |
| {{reflist}}
| |
| | |
| ==External links==
| |
| * [http://ehash.iaik.tugraz.at/wiki/Snefru-n Ecrypt page]
| |
| * [http://rhash.sourceforge.net/ RHash], an [[open source]] command-line tool, which can calculate and verify Snefru-128 and Snefru-256
| |
| | |
| {{Cryptography navbox | hash}}
| |
| | |
| [[Category:Broken hash functions]]
| |
| | |
| {{crypto-stub}}
| |
Revision as of 20:11, 10 February 2014
Gabrielle is what her spouse loves to call a though she doesn't totally like being called in that way. As a woman what your sweetheart really likes is mah jongg but she by no means made a dime by using it. Software achieving is where her important income comes from so soon her husband as well as a her will start specific own business. For a while she's not long ago in Massachusetts. Go to her website to unearth out more: http://prometeu.net
Feel free to visit my web site :: clash of clans hack android (Going Listed here)