|Do you know where your variables are?|
Re^10: monastery mark-upedness (privacy)by goibhniu (Hermit)
|on Mar 21, 2008 at 20:05 UTC||Need Help??|
Also consider this lesson from Bruce Schneier:
As far as I can see, the hash algorithm wouldn't have to be known in order to attempt this attack. It would only have to be used enough on the internet that it might be indexed with it's plaintext by Google or whatever search engine.
The only defense against this would be a roll-your-own algoritihm, and then you don't have the benefit of peer review in the cryptanalytic community.
#my sig used to say 'I humbly seek wisdom. '. Now it says:
I humbly seek wisdom.