| < draft-eastlake-fnv-13.txt | draft-eastlake-fnv-14.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 13 ¶ | skipping to change at page 1, line 13 ¶ | |||
| Network Working Group Glenn Fowler | Network Working Group Glenn Fowler | |||
| INTERNET-DRAFT Google | INTERNET-DRAFT Google | |||
| Intended Status: Informational Landon Curt Noll | Intended Status: Informational Landon Curt Noll | |||
| Cisco Systems | Cisco Systems | |||
| Kiem-Phong Vo | Kiem-Phong Vo | |||
| Donald Eastlake | Donald Eastlake | |||
| Huawei Technologies | Huawei Technologies | |||
| Tony Hansen | Tony Hansen | |||
| AT&T Laboratories | AT&T Laboratories | |||
| Expires: December 6, 2017 June 7, 2017 | Expires: June 7, 2018 December 8, 2017 | |||
| The FNV Non-Cryptographic Hash Algorithm | The FNV Non-Cryptographic Hash Algorithm | |||
| <draft-eastlake-fnv-13.txt> | <draft-eastlake-fnv-14.txt> | |||
| Abstract | Abstract | |||
| FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | |||
| good dispersion. The purpose of this document is to make information | good dispersion. The purpose of this document is to make information | |||
| on FNV and open source code performing FNV conveniently available to | on FNV and open source code performing FNV conveniently available to | |||
| the Internet community. | the Internet community. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 2, line 37 ¶ | skipping to change at page 2, line 37 ¶ | |||
| 6.1.6 FNV1024 C Code......................................82 | 6.1.6 FNV1024 C Code......................................82 | |||
| 6.2 FNV Test Code.........................................95 | 6.2 FNV Test Code.........................................95 | |||
| 7. Security Considerations...............................108 | 7. Security Considerations...............................108 | |||
| 7.1 Why is FNV Non-Cryptographic?........................108 | 7.1 Why is FNV Non-Cryptographic?........................108 | |||
| 7.2 Inducing Collisions..................................109 | 7.2 Inducing Collisions..................................109 | |||
| 8. IANA Considerations...................................110 | 8. IANA Considerations...................................110 | |||
| Normative References.....................................110 | Normative References.....................................110 | |||
| Informative References...................................110 | Informative References...................................110 | |||
| Acknowledgements.........................................111 | Acknowledgements.........................................111 | |||
| Appendix A: Work Comparison with SHA-1...................112 | Appendix A: Work Comparison with SHA-1...................112 | |||
| Appendix B: Previous IETF Reference to FNV...............113 | Appendix B: Previous IETF Reference to FNV...............113 | |||
| Appendix C: A Few Test Vectors...........................114 | Appendix C: A Few Test Vectors...........................114 | |||
| Appendix Z: Change Summary...............................115 | Appendix Z: Change Summary...............................115 | |||
| From -00 to -01..........................................115 | From -00 to -01..........................................115 | |||
| From -01 to -02..........................................115 | From -01 to -02..........................................115 | |||
| From -02 to -03..........................................115 | From -02 to -03..........................................115 | |||
| From -03 to -04..........................................115 | From -03 to -04..........................................115 | |||
| From -04 to -05..........................................116 | From -04 to -05..........................................116 | |||
| From -05 to -06..........................................116 | From -05 to -06..........................................116 | |||
| From -06 to -07 to -08...................................116 | From -06 to -07 to -08...................................116 | |||
| From -08 to -09..........................................116 | From -08 to -09..........................................116 | |||
| From -09 to -10..........................................116 | From -09 to -10..........................................116 | |||
| From -10 to -11..........................................117 | From -10 to -11..........................................117 | |||
| From -11 to -12..........................................117 | From -11 to -12..........................................117 | |||
| From -12 to -13..........................................117 | From -12 to -13..........................................117 | |||
| From -13 to -14..........................................117 | ||||
| Author's Address.........................................118 | ||||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| 1. Introduction | 1. Introduction | |||
| The FNV hash algorithm is based on an idea sent as reviewer comments | The FNV hash algorithm is based on an idea sent as reviewer comments | |||
| to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in | to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in | |||
| 1991. In a subsequent ballot round Landon Curt Noll suggested an | 1991. In a subsequent ballot round Landon Curt Noll suggested an | |||
| improvement on their algorithm. Some people tried this hash and found | improvement on their algorithm. Some people tried this hash and found | |||
| that it worked rather well. In an EMail message to Landon, they named | that it worked rather well. In an EMail message to Landon, they named | |||
| skipping to change at page 118, line 5 ¶ | skipping to change at page 117, line 26 ¶ | |||
| From -12 to -13 | From -12 to -13 | |||
| Fixed bug in pseudocode in Section 2.3. | Fixed bug in pseudocode in Section 2.3. | |||
| Change code to eliminate the BigEndian flag and so there are separate | Change code to eliminate the BigEndian flag and so there are separate | |||
| byte vector output routines for FNV32 and FNV64, equivalent to the | byte vector output routines for FNV32 and FNV64, equivalent to the | |||
| other routines, and integer output routines for cases where | other routines, and integer output routines for cases where | |||
| Endianness consistency is not required. | Endianness consistency is not required. | |||
| From -13 to -14 | ||||
| Keep alive update. | ||||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| Author's Address | Author's Address | |||
| Glenn Fowler | Glenn Fowler | |||
| Email: glenn.s.fowler@gmail.com | Email: glenn.s.fowler@gmail.com | |||
| Landon Curt Noll | Landon Curt Noll | |||
| Cisco Systems | Cisco Systems | |||
| 170 West Tasman Drive | 170 West Tasman Drive | |||
| San Jose, CA 95134 USA | San Jose, CA 95134 USA | |||
| Telephone: +1-408-424-1102 | Telephone: +1-408-424-1102 | |||
| Email: fnv-ietf3-mail@asthe.com | Email: fnv-ietf4-mail@asthe.com | |||
| URL: http://www.isthe.com/chongo/index.html | URL: http://www.isthe.com/chongo/index.html | |||
| Kiem-Phong Vo | Kiem-Phong Vo | |||
| Email: phongvo@gmail.com | Email: phongvo@gmail.com | |||
| Donald Eastlake | Donald Eastlake | |||
| Huawei Technologies | Huawei Technologies | |||
| 155 Beaver Street | 155 Beaver Street | |||
| End of changes. 8 change blocks. | ||||
| 5 lines changed or deleted | 11 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||