encryption with python
Steven D'Aprano
steve at REMOVETHIScyber.com.au
Fri Sep 9 07:06:07 EDT 2005
On Wed, 07 Sep 2005 15:52:19 -0700, James Stroud wrote:
> Also, I should note that the sha function will, to the limits of anyone's
> ability to analyze it, decouple the information from the hash. So, to be
> careful, you should keep the algorithm to generate the IDs secret.
Security by obscurity is very little security at all. If there is any
motive at all to reverse-engineer the algorithm, people will reverse
engineer the algorithm. Keeping a weak algorithm secret does not make it
strong.
--
Steven.
More information about the Python-list
mailing list