> On Aug 26, 2018, at 3:59 PM, Paul Vixie <vi...@fsi.io> wrote:
> 
>> On Sunday, August 26, 2018 5:47:43 PM UTC Tom Pusateri wrote:
>> ...
>> Nice properties of the hash:
>> 
>> 1. the length of the output value is consistent across varying input lengths
>> of any RR type (128 bits in the case of the algorithm specified in the
>> draft) making it easy to sequence through. 2. it’s independently verifiable
>> between servers and across time on the same server 3. it’s independent of
>> position of the RR it covers 
>> 4. it works the same for all existing RR’s as well as RR’s yet to be defined
>> 
>> Other methods may share some of these properties but I’m just listing all of
>> the ones I can think of.
> 
> as i wrote about a hash that was proposed in part of zone catalog work, there 
> are two things that are really bad about these. 
> 
> 1. the resulting design is not collision-resilient
> 
> 2. the hash will have to change some day, invoking rollover complexity cost
> 
> while DHT is a better example of "use a hash because it's magic and makes it 
> look like our coherency problems have gone away", in fact all non-security-
> related hash uses should be suspected of the same. you won't want to use a 
> hash in a distributed system (where hash values have to be portable) unless 
> every alternative has a vastly higher cost.
> 
> -- 
> Vixie

SHAKE128 as well as other SHA-3 algorithms have been found to be quite 
collision resistant.

Tom
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to