< draft-eastlake-fnv-15.txt   draft-eastlake-fnv-16.txt >
skipping to change at page 1, line 13 skipping to change at page 1, line 13
Network Working Group Glenn Fowler Network Working Group Glenn Fowler
INTERNET-DRAFT Google INTERNET-DRAFT Google
Intended Status: Informational Landon Curt Noll Intended Status: Informational Landon Curt Noll
Cisco Systems Cisco Systems
Kiem-Phong Vo Kiem-Phong Vo
Google Google
Donald Eastlake Donald Eastlake
Huawei Technologies Huawei Technologies
Tony Hansen Tony Hansen
AT&T Laboratories AT&T Laboratories
Expires: December 11, 2018 June 12, 2018 Expires: June 6, 2019 December 7, 2018
The FNV Non-Cryptographic Hash Algorithm The FNV Non-Cryptographic Hash Algorithm
<draft-eastlake-fnv-15.txt> <draft-eastlake-fnv-16.txt>
Abstract Abstract
FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with
good dispersion. The purpose of this document is to make information good dispersion. The purpose of this document is to make information
on FNV and open source code performing FNV conveniently available to on FNV and open source code performing FNV conveniently available to
the Internet community. the Internet community.
Status of This Memo Status of This Memo
skipping to change at page 2, line 37 skipping to change at page 2, line 37
6.1.6 FNV1024 C Code......................................82 6.1.6 FNV1024 C Code......................................82
6.2 FNV Test Code.........................................95 6.2 FNV Test Code.........................................95
7. Security Considerations...............................108 7. Security Considerations...............................108
7.1 Why is FNV Non-Cryptographic?........................108 7.1 Why is FNV Non-Cryptographic?........................108
7.2 Inducing Collisions..................................109 7.2 Inducing Collisions..................................109
8. IANA Considerations...................................110 8. IANA Considerations...................................110
Normative References.....................................110 Normative References.....................................110
Informative References...................................110 Informative References...................................110
Acknowledgements.........................................111 Acknowledgements.........................................111
Appendix A: Work Comparison with SHA-1...................112 Appendix A: Work Comparison with SHA-1...................112
Appendix B: Previous IETF Reference to FNV...............113 Appendix B: Previous IETF Reference to FNV...............113
Appendix C: A Few Test Vectors...........................114 Appendix C: A Few Test Vectors...........................114
Appendix Z: Change Summary...............................115 Appendix Z: Change Summary...............................115
From -00 to -01..........................................115 From -00 to -01..........................................115
From -01 to -02..........................................115 From -01 to -02..........................................115
From -02 to -03..........................................115 From -02 to -03..........................................115
From -03 to -04..........................................115 From -03 to -04..........................................115
From -04 to -05..........................................116 From -04 to -05..........................................116
From -05 to -06..........................................116 From -05 to -06..........................................116
From -06 to -07 to -08...................................116 From -06 to -07 to -08...................................116
From -08 to -09..........................................116 From -08 to -09..........................................116
From -09 to -10..........................................116 From -09 to -10..........................................116
From -10 to -11..........................................117 From -10 to -11..........................................117
From -11 to -12..........................................117 From -11 to -12..........................................117
From -12 to -13..........................................117 From -12 to -13..........................................117
From -13 to -14 to -15...................................117 From -13 to -14 to -15 to -16............................117
Author's Address.........................................118
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
1. Introduction 1. Introduction
The FNV hash algorithm is based on an idea sent as reviewer comments The FNV hash algorithm is based on an idea sent as reviewer comments
to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in to the [IEEE] POSIX P1003.2 committee by Glenn Fowler and Phong Vo in
1991. In a subsequent ballot round Landon Curt Noll suggested an 1991. In a subsequent ballot round Landon Curt Noll suggested an
improvement on their algorithm. Some people tried this hash and found improvement on their algorithm. Some people tried this hash and found
that it worked rather well. In an EMail message to Landon, they named that it worked rather well. In an EMail message to Landon, they named
skipping to change at page 117, line 26 skipping to change at page 117, line 26
From -12 to -13 From -12 to -13
Fixed bug in pseudocode in Section 2.3. Fixed bug in pseudocode in Section 2.3.
Change code to eliminate the BigEndian flag and so there are separate Change code to eliminate the BigEndian flag and so there are separate
byte vector output routines for FNV32 and FNV64, equivalent to the byte vector output routines for FNV32 and FNV64, equivalent to the
other routines, and integer output routines for cases where other routines, and integer output routines for cases where
Endianness consistency is not required. Endianness consistency is not required.
From -13 to -14 to -15 From -13 to -14 to -15 to -16
Keep alive updates. Keep alive updates. Update an author address.
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
Author's Address Author's Address
Glenn Fowler Glenn Fowler
Google Google
Email: glenn.s.fowler@gmail.com Email: glenn.s.fowler@gmail.com
skipping to change at page 118, line 30 skipping to change at page 118, line 30
Email: fnv-ietf4-mail@asthe.com Email: fnv-ietf4-mail@asthe.com
URL: http://www.isthe.com/chongo/index.html URL: http://www.isthe.com/chongo/index.html
Kiem-Phong Vo Kiem-Phong Vo
Google Google
Email: phongvo@gmail.com Email: phongvo@gmail.com
Donald Eastlake Donald Eastlake
Huawei Technologies Huawei Technologies
155 Beaver Street 1424 Pro Shop Court
Milford, MA 01757 USA Davenport, FL 33896 USA
Telephone: +1-508-333-2270 Telephone: +1-508-333-2270
EMail: d3e3e3@gmail.com EMail: d3e3e3@gmail.com
Tony Hansen Tony Hansen
AT&T Laboratories AT&T Laboratories
200 Laurel Ave. South 200 Laurel Ave. South
Middletown, NJ 07748 Middletown, NJ 07748
USA USA
 End of changes. 9 change blocks. 
9 lines changed or deleted 9 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/