His entire arms race - while currently deployed hash functions are easily accelerated using the GPU, and newer / larger / longer hash functions are not (due to existing hardware limitations), because the technology will work on newer and improved equipment.
My first recommendation would be for the application to provide "hash packets" identified by a positive integer. Over time, you can switch to newer and more expensive operations, and new software tools will no longer accept evidence from sets of hashes with a lower number.
Also, be unconventional. Perhaps use a combination of all the new SHA-3 candidates (all of them, in some cascading series). Use block-cipher-hash algorithms (AES can be turned into an impromptu hash function). Do a lot of rounds. It may require signing with very large RSA keys (4096 bits or higher), and unique βdiscardβ keys are also required.
You buy time, so the obsolescence mechanism is significantly more important than the choice of the actual algorithm.
Yann ramin
source share