| < draft-eastlake-fnv-15.txt | draft-eastlake-fnv-16.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 13 ¶ | skipping to change at page 1, line 13 ¶ | |||
| Network Working Group Glenn Fowler | Network Working Group Glenn Fowler | |||
| INTERNET-DRAFT Google | INTERNET-DRAFT Google | |||
| Intended Status: Informational Landon Curt Noll | Intended Status: Informational Landon Curt Noll | |||
| Cisco Systems | Cisco Systems | |||
| Kiem-Phong Vo | Kiem-Phong Vo | |||
| Donald Eastlake | Donald Eastlake | |||
| Huawei Technologies | Huawei Technologies | |||
| Tony Hansen | Tony Hansen | |||
| AT&T Laboratories | AT&T Laboratories | |||
| Expires: December 11, 2018 June 12, 2018 | Expires: June 6, 2019 December 7, 2018 | |||
| The FNV Non-Cryptographic Hash Algorithm | The FNV Non-Cryptographic Hash Algorithm | |||
| <draft-eastlake-fnv-15.txt> | <draft-eastlake-fnv-16.txt> | |||
| Abstract | Abstract | |||
| FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | |||
| good dispersion. The purpose of this document is to make information | good dispersion. The purpose of this document is to make information | |||
| on FNV and open source code performing FNV conveniently available to | on FNV and open source code performing FNV conveniently available to | |||
| the Internet community. | the Internet community. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 2, line 37 ¶ | skipping to change at page 2, line 37 ¶ | |||
| 6.1.6 FNV1024 C Code......................................82 | 6.1.6 FNV1024 C Code......................................82 | |||
| 6.2 FNV Test Code.........................................95 | 6.2 FNV Test Code.........................................95 | |||
| 7. Security Considerations...............................108 | 7. Security Considerations...............................108 | |||
| 7.1 Why is FNV Non-Cryptographic?........................108 | 7.1 Why is FNV Non-Cryptographic?........................108 | |||
| 7.2 Inducing Collisions..................................109 | 7.2 Inducing Collisions..................................109 | |||
| 8. IANA Considerations...................................110 | 8. IANA Considerations...................................110 | |||
| Normative References.....................................110 | Normative References.....................................110 | |||
| Informative References...................................110 | Informative References...................................110 | |||
| Acknowledgements.........................................111 | Acknowledgements.........................................111 | |||
| Appendix A: Work Comparison with SHA-1...................112 | Appendix A: Work Comparison with SHA-1...................112 | |||
| Appendix B: Previous IETF Reference to FNV...............113 | Appendix B: Previous IETF Reference to FNV...............113 | |||
| Appendix C: A Few Test Vectors...........................114 | Appendix C: A Few Test Vectors...........................114 | |||
| Appendix Z: Change Summary...............................115 | Appendix Z: Change Summary...............................115 | |||
| From -00 to -01..........................................115 | From -00 to -01..........................................115 | |||
| From -01 to -02..........................................115 | From -01 to -02..........................................115 | |||
| From -02 to -03..........................................115 | From -02 to -03..........................................115 | |||
| From -03 to -04..........................................115 | From -03 to -04..........................................115 | |||
| From -04 to -05..........................................116 | From -04 to -05..........................................116 | |||
| From -05 to -06..........................................116 | From -05 to -06..........................................116 | |||
| From -06 to -07 to -08...................................116 | From -06 to -07 to -08...................................116 | |||
| From -08 to -09..........................................116 | From -08 to -09..........................................116 | |||
| From -09 to -10..........................................116 | From -09 to -10..........................................116 | |||
| From -10 to -11..........................................117 | From -10 to -11..........................................117 | |||
| From -11 to -12..........................................117 | From -11 to -12..........................................117 | |||
| From -12 to -13..........................................117 | From -12 to -13..........................................117 | |||
| From -13 to -14 to -15...................................117 | From -13 to -14 to -15 to -16............................117 | |||
| Author's Address.........................................118 | ||||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| 1. Introduction | 1. Introduction | |||
| The FNV hash algorithm is based on an idea sent as reviewer comments | The FNV hash algorithm is based on an idea sent as reviewer comments | |||
| to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in | to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in | |||
| 1991. In a subsequent ballot round Landon Curt Noll suggested an | 1991. In a subsequent ballot round Landon Curt Noll suggested an | |||
| improvement on their algorithm. Some people tried this hash and found | improvement on their algorithm. Some people tried this hash and found | |||
| that it worked rather well. In an EMail message to Landon, they named | that it worked rather well. In an EMail message to Landon, they named | |||
| skipping to change at page 117, line 26 ¶ | skipping to change at page 117, line 26 ¶ | |||
| From -12 to -13 | From -12 to -13 | |||
| Fixed bug in pseudocode in Section 2.3. | Fixed bug in pseudocode in Section 2.3. | |||
| Change code to eliminate the BigEndian flag and so there are separate | Change code to eliminate the BigEndian flag and so there are separate | |||
| byte vector output routines for FNV32 and FNV64, equivalent to the | byte vector output routines for FNV32 and FNV64, equivalent to the | |||
| other routines, and integer output routines for cases where | other routines, and integer output routines for cases where | |||
| Endianness consistency is not required. | Endianness consistency is not required. | |||
| From -13 to -14 to -15 | From -13 to -14 to -15 to -16 | |||
| Keep alive updates. | Keep alive updates. Update an author address. | |||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| Author's Address | Author's Address | |||
| Glenn Fowler | Glenn Fowler | |||
| Email: glenn.s.fowler@gmail.com | Email: glenn.s.fowler@gmail.com | |||
| skipping to change at page 118, line 30 ¶ | skipping to change at page 118, line 30 ¶ | |||
| Email: fnv-ietf4-mail@asthe.com | Email: fnv-ietf4-mail@asthe.com | |||
| URL: http://www.isthe.com/chongo/index.html | URL: http://www.isthe.com/chongo/index.html | |||
| Kiem-Phong Vo | Kiem-Phong Vo | |||
| Email: phongvo@gmail.com | Email: phongvo@gmail.com | |||
| Donald Eastlake | Donald Eastlake | |||
| Huawei Technologies | Huawei Technologies | |||
| 155 Beaver Street | 1424 Pro Shop Court | |||
| Milford, MA 01757 USA | Davenport, FL 33896 USA | |||
| Telephone: +1-508-333-2270 | Telephone: +1-508-333-2270 | |||
| EMail: d3e3e3@gmail.com | EMail: d3e3e3@gmail.com | |||
| Tony Hansen | Tony Hansen | |||
| AT&T Laboratories | AT&T Laboratories | |||
| 200 Laurel Ave. South | 200 Laurel Ave. South | |||
| Middletown, NJ 07748 | Middletown, NJ 07748 | |||
| USA | USA | |||
| End of changes. 9 change blocks. | ||||
| 9 lines changed or deleted | 9 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||