b6589fc6ab0dc82cf12099d1c2d40ab994e8410c356a192b7913b04c54574d18c28d46e6395428abda4b9237bacccdf19c0760cab7aec4a8359010b0 looks random right?
Are you confident in that? Seems to assume lack of certain types of weaknesses in hash.
-
-
For this case I know of no modern cryptographic hash function vulnerable to such a problem.
-
So yes, I'm confident, as long as H is selected to be a cryptographically secure hash function. Any SHA2 variant will do nicely.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.