Hacker News new | past | comments | ask | show | jobs | submit login

In this scenario, the reasoning usually is: since both sha1 and md5 are vulnerable, it is possible to construct a document in which both the sha1 and md5 match. I don't know the feasibility of this, nor do I know how much compute time it would add. But that is a typical argument against those type of "combine two hashes" approach



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: