One of the most important properties of a cryptographic hash function is that of “Strong collision-resistance“, that is, it should be “computationally infeasible” to find distinct inputs x, x’ such that hash(x) = hash(x’).
For the SHA-1 hash function, which generates a 160 bit hash, to have strong collision resistance, only ... read more
If you work in the computer security area, it is like drinking from the fire hose, what with the daily revelations about snooping and spying by the NSA. So much to talk, write and discuss. Comedians (and their writers) get excited when interesting politicians become newsmakers, as it makes their jobs much easier and more ... read more
There was an article in the news from some nobody in Bollywood that Salman Khan is much much bigger than Sachin. I would have to agree strongly. However, the Salman Khan I am thinking of is not a Bodyguard but someone who has truly unleashed the potential in so many peopele — a teacher who ... read more
Osama was on the top of the 10 most wanted list. Wanted dead or alive — preferably alive.
US prefers to capture wanted criminals alive — if required via the extraordinary rendition — treat them as enemy combatants, interrogate, try and convict them. For e.g., US pulled Saddam Hussein from the hole he was hiding, ... read more