< draft-eastlake-fnv-14.txt   draft-eastlake-fnv-15.txt >
skipping to change at page 1, line 13 skipping to change at page 1, line 13
Network Working Group Glenn Fowler Network Working Group Glenn Fowler
INTERNET-DRAFT Google INTERNET-DRAFT Google
Intended Status: Informational Landon Curt Noll Intended Status: Informational Landon Curt Noll
Cisco Systems Cisco Systems
Kiem-Phong Vo Kiem-Phong Vo
Google Google
Donald Eastlake Donald Eastlake
Huawei Technologies Huawei Technologies
Tony Hansen Tony Hansen
AT&T Laboratories AT&T Laboratories
Expires: June 7, 2018 December 8, 2017 Expires: December 11, 2018 June 12, 2018
The FNV Non-Cryptographic Hash Algorithm The FNV Non-Cryptographic Hash Algorithm
<draft-eastlake-fnv-14.txt> <draft-eastlake-fnv-15.txt>
Abstract Abstract
FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with
good dispersion. The purpose of this document is to make information good dispersion. The purpose of this document is to make information
on FNV and open source code performing FNV conveniently available to on FNV and open source code performing FNV conveniently available to
the Internet community. the Internet community.
Status of This Memo Status of This Memo
skipping to change at page 2, line 37 skipping to change at page 2, line 37
6.1.6 FNV1024 C Code......................................82 6.1.6 FNV1024 C Code......................................82
6.2 FNV Test Code.........................................95 6.2 FNV Test Code.........................................95
7. Security Considerations...............................108 7. Security Considerations...............................108
7.1 Why is FNV Non-Cryptographic?........................108 7.1 Why is FNV Non-Cryptographic?........................108
7.2 Inducing Collisions..................................109 7.2 Inducing Collisions..................................109
8. IANA Considerations...................................110 8. IANA Considerations...................................110
Normative References.....................................110 Normative References.....................................110
Informative References...................................110 Informative References...................................110
Acknowledgements.........................................111
Acknowledgements.........................................111
Appendix A: Work Comparison with SHA-1...................112 Appendix A: Work Comparison with SHA-1...................112
Appendix B: Previous IETF Reference to FNV...............113 Appendix B: Previous IETF Reference to FNV...............113
Appendix C: A Few Test Vectors...........................114 Appendix C: A Few Test Vectors...........................114
Appendix Z: Change Summary...............................115 Appendix Z: Change Summary...............................115
From -00 to -01..........................................115 From -00 to -01..........................................115
From -01 to -02..........................................115 From -01 to -02..........................................115
From -02 to -03..........................................115 From -02 to -03..........................................115
From -03 to -04..........................................115 From -03 to -04..........................................115
From -04 to -05..........................................116 From -04 to -05..........................................116
From -05 to -06..........................................116 From -05 to -06..........................................116
From -06 to -07 to -08...................................116 From -06 to -07 to -08...................................116
From -08 to -09..........................................116 From -08 to -09..........................................116
From -09 to -10..........................................116 From -09 to -10..........................................116
From -10 to -11..........................................117 From -10 to -11..........................................117
From -11 to -12..........................................117 From -11 to -12..........................................117
From -12 to -13..........................................117 From -12 to -13..........................................117
From -13 to -14..........................................117 From -13 to -14 to -15...................................117
Author's Address.........................................118 Author's Address.........................................118
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
1. Introduction 1. Introduction
The FNV hash algorithm is based on an idea sent as reviewer comments The FNV hash algorithm is based on an idea sent as reviewer comments
to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in
1991. In a subsequent ballot round Landon Curt Noll suggested an 1991. In a subsequent ballot round Landon Curt Noll suggested an
improvement on their algorithm. Some people tried this hash and found improvement on their algorithm. Some people tried this hash and found
skipping to change at page 117, line 26 skipping to change at page 117, line 26
From -12 to -13 From -12 to -13
Fixed bug in pseudocode in Section 2.3. Fixed bug in pseudocode in Section 2.3.
Change code to eliminate the BigEndian flag and so there are separate Change code to eliminate the BigEndian flag and so there are separate
byte vector output routines for FNV32 and FNV64, equivalent to the byte vector output routines for FNV32 and FNV64, equivalent to the
other routines, and integer output routines for cases where other routines, and integer output routines for cases where
Endianness consistency is not required. Endianness consistency is not required.
From -13 to -14 From -13 to -14 to -15
Keep alive update. Keep alive updates.
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
Author's Address Author's Address
Glenn Fowler Glenn Fowler
Google Google
Email: glenn.s.fowler@gmail.com Email: glenn.s.fowler@gmail.com
skipping to change at page 119, line 9 skipping to change at page 119, line 9
200 Laurel Ave. South 200 Laurel Ave. South
Middletown, NJ 07748 Middletown, NJ 07748
USA USA
Email: tony@att.com Email: tony@att.com
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
Copyright, Disclaimer, and Additional IPR Provisions Copyright, Disclaimer, and Additional IPR Provisions
Copyright (c) 2017 IETF Trust and the persons identified as the Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
 End of changes. 8 change blocks. 
8 lines changed or deleted 7 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/