rfc9923v5.txt   rfc9923.txt 
skipping to change at line 156 skipping to change at line 156
1.3. FNV Hash Uses 1.3. FNV Hash Uses
The FNV hash has been widely used. Examples include the following: The FNV hash has been widely used. Examples include the following:
* NFS implementations (e.g., FreeBSD 4.3 [FreeBSD], IRIX, Linux (NFS * NFS implementations (e.g., FreeBSD 4.3 [FreeBSD], IRIX, Linux (NFS
v4)), v4)),
* text-based referenced resources for video games on the PS2, * text-based referenced resources for video games on the PS2,
Gamecube, and XBOX, Gamecube, and XBOX,
* Cohesia MASS project server collision avoidance [Cohesia],
* to improve the fragment cache [FragCache] at X (formerly Twitter), * to improve the fragment cache [FragCache] at X (formerly Twitter),
* the flatassembler open-source x86 assembler - user-defined symbol * the flatassembler open-source x86 assembler - user-defined symbol
hashtree [flatassembler], hashtree [flatassembler],
* used in the speed-sensitive guts of [twistylists], an open-source * used in the speed-sensitive guts of [twistylists], an open-source
structured namespace manager, structured namespace manager,
* database indexing hashes, * database indexing hashes,
skipping to change at line 222 skipping to change at line 220
and many other uses. It is also referenced in the following and many other uses. It is also referenced in the following
standards documents: [RFC7357], [RFC7873], and [IEEE8021Q-2022]. standards documents: [RFC7357], [RFC7873], and [IEEE8021Q-2022].
A study has recommended FNV in connection with the IPv6 flow label A study has recommended FNV in connection with the IPv6 flow label
value [IPv6flow]. Additionally, there was a proposal to use FNV for value [IPv6flow]. Additionally, there was a proposal to use FNV for
Bidirectional Forwarding Detection (BFD) sequence number generation Bidirectional Forwarding Detection (BFD) sequence number generation
[BFDseq]. [NCHF] discusses criteria for evaluating non-cryptographic [BFDseq]. [NCHF] discusses criteria for evaluating non-cryptographic
hash functions. hash functions.
If you use an FNV function in an application, you are kindly
requested to send an email about it to <fnvhash-mail@asthe.com> with
"FNV hash function" forming part of the subject line.
1.4. Why Is FNV Non-Cryptographic? 1.4. Why Is FNV Non-Cryptographic?
A full discussion of cryptographic hash requirements and strength is A full discussion of cryptographic hash requirements and strength is
beyond the scope of this document. However, here are three beyond the scope of this document. However, here are three
characteristics of FNV that would generally be considered to make it characteristics of FNV that would generally be considered to make it
non-cryptographic: non-cryptographic:
1. Sticky State - A cryptographic hash should not have a state in 1. Sticky State - A cryptographic hash should not have a state in
which it can stick for a plausible input pattern. But in the which it can stick for a plausible input pattern. But in the
very unlikely event that the FNV hash variable accidentally very unlikely event that the FNV hash variable accidentally
skipping to change at line 6003 skipping to change at line 5997
[BFDseq] Jethanandani, M., Agarwal, S., Mishra, A., Saxena, A., and [BFDseq] Jethanandani, M., Agarwal, S., Mishra, A., Saxena, A., and
A. DeKok, "Secure BFD Sequence Numbers", Work in Progress, A. DeKok, "Secure BFD Sequence Numbers", Work in Progress,
Internet-Draft, draft-ietf-bfd-secure-sequence-numbers-09, Internet-Draft, draft-ietf-bfd-secure-sequence-numbers-09,
29 March 2022, <https://datatracker.ietf.org/doc/html/ 29 March 2022, <https://datatracker.ietf.org/doc/html/
draft-ietf-bfd-secure-sequence-numbers-09>. draft-ietf-bfd-secure-sequence-numbers-09>.
[calc] Bell, D. and L. Noll, "Calc - C-style arbitrary precision [calc] Bell, D. and L. Noll, "Calc - C-style arbitrary precision
calculator", calculator",
<http://www.isthe.com/chongo/tech/comp/calc/index.html>. <http://www.isthe.com/chongo/tech/comp/calc/index.html>.
[Cohesia] Cohesia, "Cohesia website", <http://www.cohesia.com/>.
[deliantra] [deliantra]
The Deliantra Team, "Deliantra MMORPG", 16 October 2022, The Deliantra Team, "Deliantra MMORPG", 16 October 2022,
<http://www.deliantra.net/>. <http://www.deliantra.net/>.
[fasmlab] Fasmlab, "Integrated Development Environments", [fasmlab] Fasmlab, "Integrated Development Environments",
<https://sourceforge.net/projects/fasmlab/>. <https://sourceforge.net/projects/fasmlab/>.
[FIPS202] NIST, "SHA-3 Standard: Permutation-Based Hash and [FIPS202] NIST, "SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions", FIPS PUB 202, Extendable-Output Functions", FIPS PUB 202,
DOI 10.6028/NIST.FIPS.202, August 2015, DOI 10.6028/NIST.FIPS.202, August 2015,
 End of changes. 3 change blocks. 
8 lines changed or deleted 0 lines changed or added

This html diff was produced by rfcdiff 1.48.