25

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Footnote 25

"Because hash functions are typically many-to-one, we cannot use them to determine with certainty that the two [input] strings are equal, but we can use them to get a reasonable assurance of accuracy." Schneier, supra note 18, at § 2.4, 30-31. It is extremely improbable that two messages will produce the same hash result. See Kaufman, et al., Network Security, supra note 22, at 102.