Hacker News new | past | comments | ask | show | jobs | submit login

Information is sometimes destroyed, but we can't count on it. An algorithm like HMAC might be used to authenticate a short message. Or even if the message is long, it might also be known, so perhaps the only unknown input (the key) is short. HMAC still provides security in this case, but it's not provable-because-information-is-destroyed in the sense you're describing.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: