-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Sean C. wrote:
> 
> I'm confused though.
> I just read this article from the New York Times. As a newbie to encryption 
> and
> hash algorithms I thought the idea behind hashes was that you couldn't
> reconstruct the data from the hash.
> 

You can't, but if you have matching data, the hash will match.  For example:

List A:
        - Item 234      sample hash: asdfsdd
        - Bubble 332    sample hash: ef2342h
        - Wonky 093     sample hash: 23jasld

List B:
        - Item 324      sample hash: eja8357
        - Silly 325     sample hash: aj3hht5
        - Item 234      sample hash: asdfsdd

That would be the "match", then they can ask for the data behind the
match to be revealed.

- --
Michael B. Trausch                               <[EMAIL PROTECTED]>
Website: http://fd0man.chadeux.net/     Jabber: [EMAIL PROTECTED]
Phone: +1-(678)-522-7934              FAX (US Only): 1-866-806-4647
===================================================================
Do you have PGP or GPG?  Key at pgp.mit.edu, Please Encrypt E-Mail!

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFClCfDPXInbkqM7nwRAyCtAJ9HVOy087Fsk+ZU3BBbqEu4XtkGTQCbB/kt
bL7t6HAeYG73GwwweHB0sMo=
=h0H5
-----END PGP SIGNATURE-----

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to