I'm having trouble pinpointing the origin of the initial hash values
for SHA 224 and, for that matter, 128. These values are defined as hex
representations of cube roots of primes for sha-1 of lengths 256, 384
and 512, but I can't find where they were obtained for the shorter
lengths.
Thanks
On Thu, Dec 04, 2003 at 10:32:32PM -0500, Bill Tompkins wrote:
I can't speak to how common it is, but there are applications that
require crypto, and that require some sort of negotiation protocol, that
don't use TCP or Ethernet. For example- wireless apps, or various
non-ethernet multi-drop
Is it safe to use Pohlig-Hellman encryption with a common modulus?
That is, I want various parties to have their own exponents, but share
the same prime modulus. In my application, a chosen plaintext attack
will be possible. (I know that RSA with common modulus is not safe.)
http://edition.cnn.com/2003/TECH/internet/12/05/spam.yahoo.reut/
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Steve Bellovin wrote:
Is it safe to use Pohlig-Hellman encryption with a common modulus?
That is, I want various parties to have their own exponents, but share
the same prime modulus. In my application, a chosen plaintext attack
will be possible. (I know that RSA with common modulus is not
I wrote:
Steve Bellovin wrote:
Is it safe to use Pohlig-Hellman encryption with a common modulus?
That is, I want various parties to have their own exponents, but share
the same prime modulus. In my application, a chosen plaintext attack
will be possible. (I know that RSA with common
| NIST is proposing a change notice for FIPS 180-2, the Secure Hash Standard
| that will specify an additional hash function, SHA-224, that is based on
| SHA-256. The change notice is available at
| http://csrc.nist.gov/publications/drafts.html. NIST requests comments for
| the change notice
| Is it safe to use Pohlig-Hellman encryption with a common modulus?
| That is, I want various parties to have their own exponents, but share
| the same prime modulus. In my application, a chosen plaintext attack
| will be possible. (I know that RSA with common modulus is not safe.)
The question