[vox] Fwd: [vox-tech] Fwd: Re: [suse-security] SHA-1 broken -
impact on SuSE linux versions
Karsten M. Self
kmself at ix.netcom.com
Wed Feb 16 23:54:56 PST 2005
on Wed, Feb 16, 2005 at 09:10:52PM -0800, Rod Roark (rod at sunsetsystems.com) wrote:
> On Wednesday 16 February 2005 08:53 pm, wild bill wrote:
> > It is a very, very difficult attack requiring 2**69
> > operations. The claim of "broken" is because a brute-force
> > attack on SHA-1 requires 2**80 operations.
>
> Heh-heh. What does the true geek say upon finding a way to
> increase his chances of getting laid by a factor of 2048?
>
> "That's not good enough."
Weeellllll....
...If your initial odds exceeded the heat death of the Universe, I'd say
that's a fair gripe.
Not speaking personally....
Peace.
--
Karsten M. Self <kmself at ix.netcom.com> http://kmself.home.netcom.com/
What Part of "Gestalt" don't you understand?
Arachnophobia: actively obstructing search-engine spiders:
http://zgp.org/pipermail/linux-elitists/2002-January/003898.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://ns1.livepenguin.com/pipermail/vox/attachments/20050216/0dae462d/attachment.bin
More information about the vox
mailing list