logoalt Hacker News

jodleifyesterday at 10:44 AM1 replyview on HN

Deterministic uuids is a very standard usecase


Replies

8organicbitsyesterday at 1:20 PM

You're talking about the hash-based UUIDv3/v5? I haven't found examples of those being used, but I'm curious.

Using MD5 or 122 bits of a SHA1 hash seems questionable now that both algorithms have known collisions. Using 122 bits of a SHA2/3 seems pretty limited too. Maybe if you've got trusted inputs?

show 3 replies