Hacker News new | past | comments | ask | show | jobs | submit login

No. Hash functions can be used outside of symmetric encryption. Which is the wording I used.

In any case, the overall point remains. Short of the one time pad you can’t build a provably flawless scheme.




They can be used outside symmetric encryption, e.g. in signature schemes, but the hashing primitives are part of symmetric cryptography.


Again, I didn’t say symmetric cryptography :)


You talked about symmetric encryption.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: