< draft-eastlake-fnv-13.txt   draft-eastlake-fnv-14.txt >
skipping to change at page 1, line 13 skipping to change at page 1, line 13
Network Working Group Glenn Fowler Network Working Group Glenn Fowler
INTERNET-DRAFT Google INTERNET-DRAFT Google
Intended Status: Informational Landon Curt Noll Intended Status: Informational Landon Curt Noll
Cisco Systems Cisco Systems
Kiem-Phong Vo Kiem-Phong Vo
Google Google
Donald Eastlake Donald Eastlake
Huawei Technologies Huawei Technologies
Tony Hansen Tony Hansen
AT&T Laboratories AT&T Laboratories
Expires: December 6, 2017 June 7, 2017 Expires: June 7, 2018 December 8, 2017
The FNV Non-Cryptographic Hash Algorithm The FNV Non-Cryptographic Hash Algorithm
<draft-eastlake-fnv-13.txt> <draft-eastlake-fnv-14.txt>
Abstract Abstract
FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with
good dispersion. The purpose of this document is to make information good dispersion. The purpose of this document is to make information
on FNV and open source code performing FNV conveniently available to on FNV and open source code performing FNV conveniently available to
the Internet community. the Internet community.
Status of This Memo Status of This Memo
skipping to change at page 2, line 37 skipping to change at page 2, line 37
6.1.6 FNV1024 C Code......................................82 6.1.6 FNV1024 C Code......................................82
6.2 FNV Test Code.........................................95 6.2 FNV Test Code.........................................95
7. Security Considerations...............................108 7. Security Considerations...............................108
7.1 Why is FNV Non-Cryptographic?........................108 7.1 Why is FNV Non-Cryptographic?........................108
7.2 Inducing Collisions..................................109 7.2 Inducing Collisions..................................109
8. IANA Considerations...................................110 8. IANA Considerations...................................110
Normative References.....................................110 Normative References.....................................110
Informative References...................................110 Informative References...................................110
Acknowledgements.........................................111 Acknowledgements.........................................111
Appendix A: Work Comparison with SHA-1...................112 Appendix A: Work Comparison with SHA-1...................112
Appendix B: Previous IETF Reference to FNV...............113 Appendix B: Previous IETF Reference to FNV...............113
Appendix C: A Few Test Vectors...........................114 Appendix C: A Few Test Vectors...........................114
Appendix Z: Change Summary...............................115 Appendix Z: Change Summary...............................115
From -00 to -01..........................................115 From -00 to -01..........................................115
From -01 to -02..........................................115 From -01 to -02..........................................115
From -02 to -03..........................................115 From -02 to -03..........................................115
From -03 to -04..........................................115 From -03 to -04..........................................115
From -04 to -05..........................................116 From -04 to -05..........................................116
From -05 to -06..........................................116 From -05 to -06..........................................116
From -06 to -07 to -08...................................116 From -06 to -07 to -08...................................116
From -08 to -09..........................................116 From -08 to -09..........................................116
From -09 to -10..........................................116 From -09 to -10..........................................116
From -10 to -11..........................................117 From -10 to -11..........................................117
From -11 to -12..........................................117 From -11 to -12..........................................117
From -12 to -13..........................................117 From -12 to -13..........................................117
From -13 to -14..........................................117
Author's Address.........................................118
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
1. Introduction 1. Introduction
The FNV hash algorithm is based on an idea sent as reviewer comments The FNV hash algorithm is based on an idea sent as reviewer comments
to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in
1991. In a subsequent ballot round Landon Curt Noll suggested an 1991. In a subsequent ballot round Landon Curt Noll suggested an
improvement on their algorithm. Some people tried this hash and found improvement on their algorithm. Some people tried this hash and found
that it worked rather well. In an EMail message to Landon, they named that it worked rather well. In an EMail message to Landon, they named
skipping to change at page 118, line 5 skipping to change at page 117, line 26
From -12 to -13 From -12 to -13
Fixed bug in pseudocode in Section 2.3. Fixed bug in pseudocode in Section 2.3.
Change code to eliminate the BigEndian flag and so there are separate Change code to eliminate the BigEndian flag and so there are separate
byte vector output routines for FNV32 and FNV64, equivalent to the byte vector output routines for FNV32 and FNV64, equivalent to the
other routines, and integer output routines for cases where other routines, and integer output routines for cases where
Endianness consistency is not required. Endianness consistency is not required.
From -13 to -14
Keep alive update.
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
Author's Address Author's Address
Glenn Fowler Glenn Fowler
Google Google
Email: glenn.s.fowler@gmail.com Email: glenn.s.fowler@gmail.com
Landon Curt Noll Landon Curt Noll
Cisco Systems Cisco Systems
170 West Tasman Drive 170 West Tasman Drive
San Jose, CA 95134 USA San Jose, CA 95134 USA
Telephone: +1-408-424-1102 Telephone: +1-408-424-1102
Email: fnv-ietf3-mail@asthe.com Email: fnv-ietf4-mail@asthe.com
URL: http://www.isthe.com/chongo/index.html URL: http://www.isthe.com/chongo/index.html
Kiem-Phong Vo Kiem-Phong Vo
Google Google
Email: phongvo@gmail.com Email: phongvo@gmail.com
Donald Eastlake Donald Eastlake
Huawei Technologies Huawei Technologies
155 Beaver Street 155 Beaver Street
 End of changes. 8 change blocks. 
5 lines changed or deleted 11 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/