If you give me a hash, I can make a cipher (and vice-versa) so while a hash looks innocent enough (just some function with pseudo-random outputs) it can be used to make a cipher.
See Applied Crypto for Luby-Rackoff. Oscar (Boykin) On Thu, Sep 27, 2001 at 05:50:20PM +0000, Timm Murray wrote: > Would that even be possible? Freenet basicly can't work at all without CHKs, > and CHK uses cryptographic hashes. Perhaps hashes wouldn't count? -- boykin at pobox.com http://pobox.com/~boykin ICQ: 5118680 Key fingerprint = 159A FA02 DF12 E72F B68F 5B2D C368 3BCA 36D7 CF28 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20010927/199e4dcc/attachment.pgp>
