| < draft-eastlake-fnv-14.txt | draft-eastlake-fnv-15.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 13 ¶ | skipping to change at page 1, line 13 ¶ | |||
| Network Working Group Glenn Fowler | Network Working Group Glenn Fowler | |||
| INTERNET-DRAFT Google | INTERNET-DRAFT Google | |||
| Intended Status: Informational Landon Curt Noll | Intended Status: Informational Landon Curt Noll | |||
| Cisco Systems | Cisco Systems | |||
| Kiem-Phong Vo | Kiem-Phong Vo | |||
| Donald Eastlake | Donald Eastlake | |||
| Huawei Technologies | Huawei Technologies | |||
| Tony Hansen | Tony Hansen | |||
| AT&T Laboratories | AT&T Laboratories | |||
| Expires: June 7, 2018 December 8, 2017 | Expires: December 11, 2018 June 12, 2018 | |||
| The FNV Non-Cryptographic Hash Algorithm | The FNV Non-Cryptographic Hash Algorithm | |||
| <draft-eastlake-fnv-14.txt> | <draft-eastlake-fnv-15.txt> | |||
| Abstract | Abstract | |||
| FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | |||
| good dispersion. The purpose of this document is to make information | good dispersion. The purpose of this document is to make information | |||
| on FNV and open source code performing FNV conveniently available to | on FNV and open source code performing FNV conveniently available to | |||
| the Internet community. | the Internet community. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 2, line 37 ¶ | skipping to change at page 2, line 37 ¶ | |||
| 6.1.6 FNV1024 C Code......................................82 | 6.1.6 FNV1024 C Code......................................82 | |||
| 6.2 FNV Test Code.........................................95 | 6.2 FNV Test Code.........................................95 | |||
| 7. Security Considerations...............................108 | 7. Security Considerations...............................108 | |||
| 7.1 Why is FNV Non-Cryptographic?........................108 | 7.1 Why is FNV Non-Cryptographic?........................108 | |||
| 7.2 Inducing Collisions..................................109 | 7.2 Inducing Collisions..................................109 | |||
| 8. IANA Considerations...................................110 | 8. IANA Considerations...................................110 | |||
| Normative References.....................................110 | Normative References.....................................110 | |||
| Informative References...................................110 | Informative References...................................110 | |||
| Acknowledgements.........................................111 | ||||
| Acknowledgements.........................................111 | ||||
| Appendix A: Work Comparison with SHA-1...................112 | Appendix A: Work Comparison with SHA-1...................112 | |||
| Appendix B: Previous IETF Reference to FNV...............113 | Appendix B: Previous IETF Reference to FNV...............113 | |||
| Appendix C: A Few Test Vectors...........................114 | Appendix C: A Few Test Vectors...........................114 | |||
| Appendix Z: Change Summary...............................115 | Appendix Z: Change Summary...............................115 | |||
| From -00 to -01..........................................115 | From -00 to -01..........................................115 | |||
| From -01 to -02..........................................115 | From -01 to -02..........................................115 | |||
| From -02 to -03..........................................115 | From -02 to -03..........................................115 | |||
| From -03 to -04..........................................115 | From -03 to -04..........................................115 | |||
| From -04 to -05..........................................116 | From -04 to -05..........................................116 | |||
| From -05 to -06..........................................116 | From -05 to -06..........................................116 | |||
| From -06 to -07 to -08...................................116 | From -06 to -07 to -08...................................116 | |||
| From -08 to -09..........................................116 | From -08 to -09..........................................116 | |||
| From -09 to -10..........................................116 | From -09 to -10..........................................116 | |||
| From -10 to -11..........................................117 | From -10 to -11..........................................117 | |||
| From -11 to -12..........................................117 | From -11 to -12..........................................117 | |||
| From -12 to -13..........................................117 | From -12 to -13..........................................117 | |||
| From -13 to -14..........................................117 | From -13 to -14 to -15...................................117 | |||
| Author's Address.........................................118 | Author's Address.........................................118 | |||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| 1. Introduction | 1. Introduction | |||
| The FNV hash algorithm is based on an idea sent as reviewer comments | The FNV hash algorithm is based on an idea sent as reviewer comments | |||
| to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in | to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in | |||
| 1991. In a subsequent ballot round Landon Curt Noll suggested an | 1991. In a subsequent ballot round Landon Curt Noll suggested an | |||
| improvement on their algorithm. Some people tried this hash and found | improvement on their algorithm. Some people tried this hash and found | |||
| skipping to change at page 117, line 26 ¶ | skipping to change at page 117, line 26 ¶ | |||
| From -12 to -13 | From -12 to -13 | |||
| Fixed bug in pseudocode in Section 2.3. | Fixed bug in pseudocode in Section 2.3. | |||
| Change code to eliminate the BigEndian flag and so there are separate | Change code to eliminate the BigEndian flag and so there are separate | |||
| byte vector output routines for FNV32 and FNV64, equivalent to the | byte vector output routines for FNV32 and FNV64, equivalent to the | |||
| other routines, and integer output routines for cases where | other routines, and integer output routines for cases where | |||
| Endianness consistency is not required. | Endianness consistency is not required. | |||
| From -13 to -14 | From -13 to -14 to -15 | |||
| Keep alive update. | Keep alive updates. | |||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| Author's Address | Author's Address | |||
| Glenn Fowler | Glenn Fowler | |||
| Email: glenn.s.fowler@gmail.com | Email: glenn.s.fowler@gmail.com | |||
| skipping to change at page 119, line 9 ¶ | skipping to change at page 119, line 9 ¶ | |||
| 200 Laurel Ave. South | 200 Laurel Ave. South | |||
| Middletown, NJ 07748 | Middletown, NJ 07748 | |||
| USA | USA | |||
| Email: tony@att.com | Email: tony@att.com | |||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| Copyright, Disclaimer, and Additional IPR Provisions | Copyright, Disclaimer, and Additional IPR Provisions | |||
| Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| End of changes. 8 change blocks. | ||||
| 8 lines changed or deleted | 7 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||