<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Preferred hashing tools in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35745#M2688</link>
    <description>Hashdeep/md5deep if I am doing manual hashes.&lt;BR /&gt;&lt;BR /&gt;I run MD5 AND SHA-256.&lt;BR /&gt;&lt;BR /&gt;Possible collisions on one or the other. Collisions from two different algorithms? There isn’t a number big enough to define the odds.&lt;BR /&gt;&lt;BR /&gt;-Eric</description>
    <pubDate>Mon, 18 May 2020 13:07:04 GMT</pubDate>
    <dc:creator>Baechle</dc:creator>
    <dc:date>2020-05-18T13:07:04Z</dc:date>
    <item>
      <title>Preferred hashing tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35124#M2618</link>
      <description>&lt;P&gt;What software tools do you use for performing file hashes?&amp;nbsp; And when you hash, are you especially careful to use SHA256, or do you use MD5?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2020 12:59:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35124#M2618</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-04-27T12:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: Preferred hashing tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35141#M2622</link>
      <description>&lt;P&gt;No comment on commercial tools &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://community.isc2.org/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; since our shop builds and integrates software. We rely heavily upon hash function guidance provided by &lt;A href="https://csrc.nist.gov/Projects/Hash-Functions" target="_blank" rel="noopener"&gt;NIST&lt;/A&gt;. Specifically, we reference FIPS 202, which specifies the new SHA-3 family of permutation-based functions based on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://keccak.noekeon.org/" target="_blank" rel="noopener"&gt;KECCAK&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as a result of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://csrc.nist.gov/projects/hash-functions/sha-3-project" target="_blank" rel="noopener"&gt;“SHA-3” Cryptographic Hash Algorithm Competition&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FIPS 202 specifies:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;Four fixed-length hash algorithms:&amp;nbsp;&lt;STRONG&gt;SHA3-224, SHA3-256, SHA3-384,&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;SHA3-512&lt;/STRONG&gt;; and&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Two closely related, “extendable-output” functions (XOFs):&amp;nbsp;&lt;STRONG&gt;SHAKE128&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;SHAKE256&lt;/STRONG&gt;.&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Currently, only the four fixed-length SHA-3 algorithms are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;approved&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;hash algorithms, providing alternatives to the SHA-2 family of hash functions.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A lot of these algorithms have found their way into the &lt;A href="https://www.bouncycastle.org/java.html" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Legion of the Bouncy Castle&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;Java cryptography APIs and&amp;nbsp;FIPS mode "jars" so that makes including the functions easy.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 03:19:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35141#M2622</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-04-28T03:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: Preferred hashing tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35466#M2654</link>
      <description>&lt;P&gt;Thanks, by the way!&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 12:07:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35466#M2654</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-05-08T12:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Preferred hashing tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35745#M2688</link>
      <description>Hashdeep/md5deep if I am doing manual hashes.&lt;BR /&gt;&lt;BR /&gt;I run MD5 AND SHA-256.&lt;BR /&gt;&lt;BR /&gt;Possible collisions on one or the other. Collisions from two different algorithms? There isn’t a number big enough to define the odds.&lt;BR /&gt;&lt;BR /&gt;-Eric</description>
      <pubDate>Mon, 18 May 2020 13:07:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Preferred-hashing-tools/m-p/35745#M2688</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2020-05-18T13:07:04Z</dc:date>
    </item>
  </channel>
</rss>

