Jump to content

Talk:Security of cryptographic hash functions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by RavelTwig (talk | contribs) at 02:12, 28 January 2014. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Restructuring proposal

It seems out of place to have an article dedicated to Provably secure cryptographic hash functions when only the second half of the article discusses these functions, where as the first half discusses security of hash functions in general. Also, the first half of this article is redundant with information given in the first half of Cryptographic hash function. This article appears to be trying to discuss the security of hash functions in general in addition to providing information on "provably secure" ones.

Move Proposal

Provably secure cryptographic hash functionSecurity of cryptographic hash functions – Possibly move this article to Security of cryptographic hash functions and then incorporate the content of Cryptographic hash function#Properties and Provably secure cryptographic hash function#Types of Security of Hash Functions along with a section about Provably secure cryptographic hash functions. RavelTwig (talk) 02:11, 28 January 2014 (UTC)[reply]

Merge Proposal

OR merge this article into a "Security" section under Cryptographic hash function and then add subsection Provably secure cryptographic hash function.

RavelTwig (talk) 02:12, 28 January 2014 (UTC)[reply]