From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Footnote 25

"Because hash functions are typically many-to-one, we cannot use them to determine with certainty that the two [input] strings are equal, but we can use them to get a reasonable assurance of accuracy." Schneier, supra note 18, at § 2.4, 30-31. It is extremely improbable that two messages will produce the same hash result. See Kaufman, et al., Network Security, supra note 22, at 102.