| rfc9923v5.txt | rfc9923.txt | |||
|---|---|---|---|---|
| skipping to change at line 156 ¶ | skipping to change at line 156 ¶ | |||
| 1.3. FNV Hash Uses | 1.3. FNV Hash Uses | |||
| The FNV hash has been widely used. Examples include the following: | The FNV hash has been widely used. Examples include the following: | |||
| * NFS implementations (e.g., FreeBSD 4.3 [FreeBSD], IRIX, Linux (NFS | * NFS implementations (e.g., FreeBSD 4.3 [FreeBSD], IRIX, Linux (NFS | |||
| v4)), | v4)), | |||
| * text-based referenced resources for video games on the PS2, | * text-based referenced resources for video games on the PS2, | |||
| Gamecube, and XBOX, | Gamecube, and XBOX, | |||
| * Cohesia MASS project server collision avoidance [Cohesia], | ||||
| * to improve the fragment cache [FragCache] at X (formerly Twitter), | * to improve the fragment cache [FragCache] at X (formerly Twitter), | |||
| * the flatassembler open-source x86 assembler - user-defined symbol | * the flatassembler open-source x86 assembler - user-defined symbol | |||
| hashtree [flatassembler], | hashtree [flatassembler], | |||
| * used in the speed-sensitive guts of [twistylists], an open-source | * used in the speed-sensitive guts of [twistylists], an open-source | |||
| structured namespace manager, | structured namespace manager, | |||
| * database indexing hashes, | * database indexing hashes, | |||
| skipping to change at line 222 ¶ | skipping to change at line 220 ¶ | |||
| and many other uses. It is also referenced in the following | and many other uses. It is also referenced in the following | |||
| standards documents: [RFC7357], [RFC7873], and [IEEE8021Q-2022]. | standards documents: [RFC7357], [RFC7873], and [IEEE8021Q-2022]. | |||
| A study has recommended FNV in connection with the IPv6 flow label | A study has recommended FNV in connection with the IPv6 flow label | |||
| value [IPv6flow]. Additionally, there was a proposal to use FNV for | value [IPv6flow]. Additionally, there was a proposal to use FNV for | |||
| Bidirectional Forwarding Detection (BFD) sequence number generation | Bidirectional Forwarding Detection (BFD) sequence number generation | |||
| [BFDseq]. [NCHF] discusses criteria for evaluating non-cryptographic | [BFDseq]. [NCHF] discusses criteria for evaluating non-cryptographic | |||
| hash functions. | hash functions. | |||
| If you use an FNV function in an application, you are kindly | ||||
| requested to send an email about it to <fnvhash-mail@asthe.com> with | ||||
| "FNV hash function" forming part of the subject line. | ||||
| 1.4. Why Is FNV Non-Cryptographic? | 1.4. Why Is FNV Non-Cryptographic? | |||
| A full discussion of cryptographic hash requirements and strength is | A full discussion of cryptographic hash requirements and strength is | |||
| beyond the scope of this document. However, here are three | beyond the scope of this document. However, here are three | |||
| characteristics of FNV that would generally be considered to make it | characteristics of FNV that would generally be considered to make it | |||
| non-cryptographic: | non-cryptographic: | |||
| 1. Sticky State - A cryptographic hash should not have a state in | 1. Sticky State - A cryptographic hash should not have a state in | |||
| which it can stick for a plausible input pattern. But in the | which it can stick for a plausible input pattern. But in the | |||
| very unlikely event that the FNV hash variable accidentally | very unlikely event that the FNV hash variable accidentally | |||
| skipping to change at line 6003 ¶ | skipping to change at line 5997 ¶ | |||
| [BFDseq] Jethanandani, M., Agarwal, S., Mishra, A., Saxena, A., and | [BFDseq] Jethanandani, M., Agarwal, S., Mishra, A., Saxena, A., and | |||
| A. DeKok, "Secure BFD Sequence Numbers", Work in Progress, | A. DeKok, "Secure BFD Sequence Numbers", Work in Progress, | |||
| Internet-Draft, draft-ietf-bfd-secure-sequence-numbers-09, | Internet-Draft, draft-ietf-bfd-secure-sequence-numbers-09, | |||
| 29 March 2022, <https://datatracker.ietf.org/doc/html/ | 29 March 2022, <https://datatracker.ietf.org/doc/html/ | |||
| draft-ietf-bfd-secure-sequence-numbers-09>. | draft-ietf-bfd-secure-sequence-numbers-09>. | |||
| [calc] Bell, D. and L. Noll, "Calc - C-style arbitrary precision | [calc] Bell, D. and L. Noll, "Calc - C-style arbitrary precision | |||
| calculator", | calculator", | |||
| <http://www.isthe.com/chongo/tech/comp/calc/index.html>. | <http://www.isthe.com/chongo/tech/comp/calc/index.html>. | |||
| [Cohesia] Cohesia, "Cohesia website", <http://www.cohesia.com/>. | ||||
| [deliantra] | [deliantra] | |||
| The Deliantra Team, "Deliantra MMORPG", 16 October 2022, | The Deliantra Team, "Deliantra MMORPG", 16 October 2022, | |||
| <http://www.deliantra.net/>. | <http://www.deliantra.net/>. | |||
| [fasmlab] Fasmlab, "Integrated Development Environments", | [fasmlab] Fasmlab, "Integrated Development Environments", | |||
| <https://sourceforge.net/projects/fasmlab/>. | <https://sourceforge.net/projects/fasmlab/>. | |||
| [FIPS202] NIST, "SHA-3 Standard: Permutation-Based Hash and | [FIPS202] NIST, "SHA-3 Standard: Permutation-Based Hash and | |||
| Extendable-Output Functions", FIPS PUB 202, | Extendable-Output Functions", FIPS PUB 202, | |||
| DOI 10.6028/NIST.FIPS.202, August 2015, | DOI 10.6028/NIST.FIPS.202, August 2015, | |||
| End of changes. 3 change blocks. | ||||
| 8 lines changed or deleted | 0 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||