On Mon, Nov 12, 2007 at 07:03:22AM -0800, dwight elvey wrote:
From: cclist at
sydex.com
On 11 Nov 2007 at 21:44, dwight elvey wrote:
It has been some time since I played with
CRC's. I once
had to write test to check CRC chips that used
the Chinese Remainder Theorem to make data correction.
I had to make sure that it corrected correctly by checking
each part of the error correction. That was many years
ago.
I've still got the docs for the WD chip that would do both ECC and
CRC. When I was securing data for computer forensics, I started with
two interlocked CRCs using different polynomials. Eventually, the
gummint expressed a preference for SHA hashes, so the CRC went the
way of the dodo. SHA was a LOT slower than CRC or even MD5.
Hi Chuck
What are SHA hashes? I've not heard that term before.
SHA ist a family of secure hash functions. Usually, SHA-1 is used as a
cryptographically strong hash function.
General take on SHA hash functions:
http://en.wikipedia.org/wiki/SHA-1
FIPS publication 180-1 on the Secure Hash Standard:
http://www.itl.nist.gov/fipspubs/fip180-1.htm
Unfortunately, SHA-1 has been broken more than 2 years ago, so while it
is fine for error detection, it is not a good idea to use SHA-1 alone
for signatures.
At a project were we needed digital signature to authenticate documents,
we computed three different hash functions (SHA-1, MD5 and RMD160) and
signed the resulting signature file with a PGP key.
The CRC chips I was looking at were from AMD when I
worked for Systems Industries. Now I work for AMD
but the only thing they work on today are processors.
Regards,
Alex.
--
"Opportunity is missed by most people because it is dressed in overalls and
looks like work." -- Thomas A. Edison