-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Sean C. wrote: > > I'm confused though. > I just read this article from the New York Times. As a newbie to encryption > and > hash algorithms I thought the idea behind hashes was that you couldn't > reconstruct the data from the hash. >
You can't, but if you have matching data, the hash will match. For example: List A: - Item 234 sample hash: asdfsdd - Bubble 332 sample hash: ef2342h - Wonky 093 sample hash: 23jasld List B: - Item 324 sample hash: eja8357 - Silly 325 sample hash: aj3hht5 - Item 234 sample hash: asdfsdd That would be the "match", then they can ask for the data behind the match to be revealed. - -- Michael B. Trausch <[EMAIL PROTECTED]> Website: http://fd0man.chadeux.net/ Jabber: [EMAIL PROTECTED] Phone: +1-(678)-522-7934 FAX (US Only): 1-866-806-4647 =================================================================== Do you have PGP or GPG? Key at pgp.mit.edu, Please Encrypt E-Mail! -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFClCfDPXInbkqM7nwRAyCtAJ9HVOy087Fsk+ZU3BBbqEu4XtkGTQCbB/kt bL7t6HAeYG73GwwweHB0sMo= =h0H5 -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users