Talk:Security of cryptographic hash functions: Difference between revisions

Content deleted Content added
RavelTwig (talk | contribs)
No edit summary
RavelTwig (talk | contribs)
No edit summary
Line 1:
== Restructuring/Moving article proposal==
It seems out of place to have an article dedicated to [[Provably secure cryptographic hash function]]s when only the second half of the article discusses these functions, where as the first half discusses security of hash functions in general. I'mAlso, thinkingthe offirst movinghalf of this article tois [[Securityredundant ofwith cryptographicinformation hashgiven functions]]in andthe thenfirst incorporating the contenthalf of [[Cryptographic hash function#Properties]]. andThis [[Provablyarticle secureappears cryptographicto hashbe function#Typestrying ofto Securitydiscuss ofthe Hashsecurity Functions]] along with a section about Provably secure cryptographicof hash functions. OR,in maybegeneral addin "Security"addition asto aproviding sectioninformation underon [[Cryptographic hash function]] and then subsection Provably"provably secure" cryptographic hash function. The first half of the article seems out of place, and is redundant with information given in the first half of [[Cryptographic hash function]]ones.
===Move Proposal===
 
{{Requested move/dated|Security of cryptographic hash functions}}
[[User:RavelTwig|RavelTwig]] ([[User talk:RavelTwig|talk]]) 01:52, 28 January 2014 (UTC)
 
[[:Provably secure cryptographic hash function]] → {{no redirect|Security of cryptographic hash functions}} – Possibly move this article to [[Security of cryptographic hash functions]] and then incorporate the content of [[Cryptographic hash function#Properties]] and [[Provably secure cryptographic hash function#Types of Security of Hash Functions]] along with a section about Provably secure cryptographic hash functions. [[User:RavelTwig|RavelTwig]] ([[User talk:RavelTwig|talk]]) 02:11, 28 January 2014 (UTC)
===Merge Proposal===
OR merge this article into a "Security" section under [[Cryptographic hash function]] and then add subsection Provably secure cryptographic hash function.