On Tue, 13 Apr 2021 20:17:37 +0200 Markus Wichmann <nullp...@gmx.net> wrote:
> On Tue, Apr 13, 2021 at 05:08:31PM +0200, Mattias Andrée wrote: > > On Tue, 13 Apr 2021 16:57:39 +0200 > > Sagar Acharya <sagaracha...@tutanota.com> wrote: > > > > > Sure, any good signature. SHA512 is stronger than SHA1, MD5 and SHA256. > > > It shouldn't take a second more than others. Why use a weaker checksum? > > > > SHA512 is actually more than twice as fast as SHA256 on 64-bit machines. > > (I don't know which is stronger). > > > > Y'know, while we're bikeshedding, why not just use SHA-3? Keccak has > been out for a while now, and it is also available in 256 and 512 bit > variants. I keep wondering why people keep using SHA-2 variants. Do you > want to wait until it is cracked? I use SHA-3 :) But interesting, even though Keccak (from which SHA-3 is derived) won over BLAKE2, BLAKE2 seems to be more popular. > > SHA-3 would have the benefit of always being a 64-bit algorithm (unlike > SHA-2, which is 32-bit in the 192 and 256 bit variants, and 64-bit in > the 384 and 512 bit variants, necessitating two very similar processing > functions in C). SHA-3 may be 64-bit, it's just a set of four special configurations of Keccak which does not have restriction at all, which complicates the algorithm. Just like you would just choose SHA-3 and not Keccak, and one specific version of it, you would only choose one specific version of SHA-2, so if you only implement that version, you can get rid of these complexities. However, in the real world applications would implement all, or at least four, of the SHA-2 versions, which only require two distinct, simple implementations. With SHA-3, you can get rid of some complexity by restricting the implementation to SHA-3, but wouldn't you implement it via Keccak, so you easily can implement all variants of Keccak? (When I implemented sha3sum, SHA-3 was not defined yet, we only had Keccak, so I had to implement it with all those complexities, then I just left it when SHA-3 was finalised, so it could support more hashing algorithms.) > Its design also makes HMAC easier, though this is not > of import for this application. > > > I see no point in having checksums at all, except for detecting bitrot. > > Signatures are of course good. > > > > Signatures only help if you have a known-good public key. Anyone can > create a key and claim it belongs to, say, Barack Obama. I have no > public key of anyone affiliated with suckless, and no way to verify if > any key I get off of a keyserver is actually one of theirs. That's were the idea of web of trust comes in. During slcon, we can have key signing parties. Then other people can sign our keys, and eventually there a chain from someone you trust to the suckless developers. Additionally, the developers can host their signed keys on other websites, including their own. Then, if you get them of multiple servers, including well-known ones, they are fairly trustable. > > Security is hard. > > Ciao, > Markus >