ected by) the NESSIE project.
For high-security applications, combining a SHA-2 variant and either
RIPEMD-160 or Whirlpool is sufficient to satisfy even the
professionally paranoid among us. I chose a SHA-256+Whirlpool
combination for signature verification in the OLPC firmware.
--
Ivan Krst
tion. The SHA-2 family is not merely a longer
SHA-1; while closely based on SHA-1, the SHA-2 compression function is
different enough that the resulting hashes are much stronger, and
practical attacks on SHA-2 are considered unlikely in at least the
next ten years.
--
Ivan Krstić <[EMA