[vox] Fwd: [vox-tech] Fwd: Re: [suse-security] SHA-1 broken - impact on SuSE linux versions

Karsten M. Self kmself at ix.netcom.com
Wed Feb 16 23:54:56 PST 2005


on Wed, Feb 16, 2005 at 09:10:52PM -0800, Rod Roark (rod at sunsetsystems.com) wrote:
> On Wednesday 16 February 2005 08:53 pm, wild bill wrote:
> > It is a very, very difficult attack requiring 2**69
> >  operations. The claim of "broken" is because a brute-force
> >  attack on SHA-1 requires 2**80 operations.
> 
> Heh-heh.  What does the true geek say upon finding a way to
> increase his chances of getting laid by a factor of 2048?
> 
> "That's not good enough."

Weeellllll....

...If your initial odds exceeded the heat death of the Universe, I'd say
that's a fair gripe.

Not speaking personally....


Peace.

-- 
Karsten M. Self <kmself at ix.netcom.com>        http://kmself.home.netcom.com/
 What Part of "Gestalt" don't you understand?
    Arachnophobia:  actively obstructing search-engine spiders:
    http://zgp.org/pipermail/linux-elitists/2002-January/003898.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://ns1.livepenguin.com/pipermail/vox/attachments/20050216/0dae462d/attachment.bin


More information about the vox mailing list