GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
Digest::SV1(3) User Contributed Perl Documentation Digest::SV1(3)

Digest::SV1 - Cryptosleazically strong message digest format

  $sv1  = Digest::SV1->new();

  $sv1->add( $data, ... );

  $sv1->addfile( $io_handle );

  $sv1->digest
  $sv1->hexdigest
  $sv1->b64digest

So, you chose a hashing algorithm as recommended by the leading security experts of yesteryear, it got hacked, and now some mysterious 15 year old cracker 0wns your toaster because of it.

Fight back! This hash algorithm is designed to infuriate the Mathematicians and Cryptographers out there, who will swear us lowly software engineers are missing the point of all this digest stuff.

Put simply, if one hashing algorithm won't do the job satisfactorily, then why not use several.

The main algorithm in this module forms the authorative definition of how the SV1 digest format is to operate.

See Digest for a detailed description of the Digest API.

Warning: some of the constructed and artificial mathematical formulae may have some kind of constructed and artificial legislation, documentation, papers, et cetera that some group of people acting as a constructed and artificial construct known as a `legal person' that exploited the person who came up with the idea might maintain has some kind of constructed and artificial power to restrict your freedom as recognised by some constructed and artificial social structure. You are strongly advised to just not give a smeg.

Why such a small hash size?
Because the reasons that a cryptographer extends the hash size differ from the reasons that a software engineer does.
What's the effective hash entropy?
Dunno. Let's say that SHA1 is 160 bits, but has a `difficulty' of 2^50 to crack. We're using MD5 and Haval-256 as well, and say that they have respective `difficulties' of 2^32 and 2^60 as well.

Assuming that the algorithms are diverse enough to not share a common flaw, then you could safely add the exponents of these difficulties to get a rough estimate of the safety of the algorithm.

But then, I am not a cryptographer. The real reason is that md5 hashes are long enough, already! Heck, there's no sense into lulling you into a false sense of large hash size cryptonirvana, when the algorithm might be picked apart by some 8 year old prodigy in Russia and those extra 384 bits per checksum only added a complexity of about 4 to a would-be attacker.

If you really want to keep your data safe, simply don't harbour karmic terrorists.

This module is nothing other than a convention. There are more lines of documentation than real code.

The real heroes are;

Gisle Aas
Excellent "Digest::base" module and related utilities, and the Digest::MD5 implementation. Oh, and help with the SHA-1 interface.
Neil Winton
The original MD5 interface author.
Peter C. Gutmann
Co-author of Digest::SHA1
Uwe Hollerbach
Co-author of Digest::SHA1
Julius C. Duque
Author of Digest::Haval-256
Ron Rivest
Inventor of the MD5 and SHA1 digest formats. He was working for RSA for the former, and our good friends the NSA for SHA-1.
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry.
Designers of the Haval-256 digest format.

Last, and in order of actual code contributed, least:

  Sam Vilain, <samv@cpan.org>
2022-04-09 perl v5.32.1

Search for    or go to Top of page |  Section 3 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.