encryption with python

Steven D'Aprano steve at REMOVETHIScyber.com.au
Fri Sep 9 07:06:07 EDT 2005


On Wed, 07 Sep 2005 15:52:19 -0700, James Stroud wrote:

> Also, I should note that the sha function will, to the limits of anyone's 
> ability to analyze it, decouple the information from the hash. So, to be 
> careful, you should keep the algorithm to generate the IDs secret.

Security by obscurity is very little security at all. If there is any
motive at all to reverse-engineer the algorithm, people will reverse
engineer the algorithm. Keeping a weak algorithm secret does not make it
strong.



-- 
Steven.




More information about the Python-list mailing list