On Thu, 23 Dec 2010 16:33:59 -0800 (PST)
John Hardin <jhar...@impsec.org> wrote:

[...]

> To digress, I would suggest the solution to that (and what I wish PGP
> had implemented from day one) is to sign using two different
> cryptographic hash algorithms (e.g. MD5 _and_ SHA1). It's extremely
> unlikely that two different hash algorithms would have the same
> collision failure mode - i.e. it would be effectively impossible to
> generate a single plaintext that would generate the desired hashes
> for _both_ algorithms.

I'm sure I read somewhere that in many cases, hashing with two
different hash functions is as strong as the stronger of the two
functions, but not any stronger than that.

It's still a good idea if you don't know for sure *which* one is the
stronger function.

See "Concatenation of cryptographic has functions" at
http://en.wikipedia.org/wiki/Cryptographic_hash_function

Back on-topic: I don't think it's a problem to have a reversible way
of encoding email addresses if they're used for blocking.  The
anti-phishing email reply address project produces a cleartext list of
known phishing senders.  These are (typically) compromised email
accounts where the sender cannot continue to use the account and also
change the sending address, so it does no harm to leave it in the
clear.

Regards,

David.

Reply via email to