Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider supporting SipHash #16

Open
dd86k opened this issue Nov 15, 2022 · 1 comment
Open

Consider supporting SipHash #16

dd86k opened this issue Nov 15, 2022 · 1 comment
Assignees
Labels
enhancement New feature or request

Comments

@dd86k
Copy link
Owner

dd86k commented Nov 15, 2022

A few pitched in the idea to support SipHash.

As interesting as SipHash is, it is not designed as a general-purpose hashing function, since its goal is to be used as a pseudorandom/MAC function:

As a secure pseudorandom function (a.k.a. keyed hash function), SipHash can also be used as a secure message authentication code (MAC). But SipHash is not a hash in the sense of general-purpose key-less hash function such as BLAKE3 or SHA-3. SipHash should therefore always be used with a secret key in order to be secure.

Meaning, even implementing this using a keyless-default approach renders the implementation and security pointless. Because ddh is supposed to be closest to sha512sum(1), openssl dgst, b3sum, and the like.

@dd86k dd86k added the enhancement New feature or request label Nov 15, 2022
@dd86k dd86k self-assigned this Nov 15, 2022
@dd86k
Copy link
Owner Author

dd86k commented Nov 17, 2022

One possibility could be, if siphash was implemented, to force the --key option to be used (or issue a warning on stderr?), which could make siphash an interesting feature then. Though, likely not one I'd use to verify file integrity for my downloads unless sites started to offer them. Maybe one day?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant