25

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 15:47, 3 April 2007 by Mdpeters (talk | contribs) (New page: ==Footnote 25== "Because hash functions are typically many-to-one, we cannot use them to determine with certainty that the two [input] strings are equal, but we can use them to get a reaso...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Footnote 25

"Because hash functions are typically many-to-one, we cannot use them to determine with certainty that the two [input] strings are equal, but we can use them to get a reasonable assurance of accuracy." Schneier, supra note 18, at § 2.4, 30-31. It is extremely improbable that two messages will produce the same hash result. See Kaufman, et al., Network Security, supra note 22, at 102.