You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ed2k is a protocol that had quite some significance. Compared to torrent-info it has the advantage of identical files always yielding the same hash, since there's nothing tweakable in it. As with the case of torrent, it might have some value in eventually being addressable by ipfs.
A related, stronger hash is the AICH hash tree used by eMule. This is a merkel tree used for error correction, but being built out of SHA-1 it suffers from slightly fewer security complaints.
In the same line of incorporating P2P hashes, Gnutella, G2, Gnunet, Freenet et al. can also each use a type.
The text was updated successfully, but these errors were encountered:
Feel free to add it to the table. As long as it can be properly defined as a hash function and not some funky mash-up then it should be fine to add. Preferably not below 127 as that's the precious single-byte range that we're fairly protective of and reserve for more commonly used identifiers that need the efficiency.
ed2k is a protocol that had quite some significance. Compared to torrent-info it has the advantage of identical files always yielding the same hash, since there's nothing tweakable in it. As with the case of torrent, it might have some value in eventually being addressable by ipfs.
A related, stronger hash is the AICH hash tree used by eMule. This is a merkel tree used for error correction, but being built out of SHA-1 it suffers from slightly fewer security complaints.
In the same line of incorporating P2P hashes, Gnutella, G2, Gnunet, Freenet et al. can also each use a type.
The text was updated successfully, but these errors were encountered: