If you give me a hash, I can make a cipher (and vice-versa) so while a
hash looks innocent enough (just some function with pseudo-random
outputs) it can be used to make a cipher.

See Applied Crypto for Luby-Rackoff.

Oscar (Boykin) 

On Thu, Sep 27, 2001 at 05:50:20PM +0000, Timm Murray wrote:
> Would that even be possible? Freenet basicly can't work at all without CHKs, 
> and CHK uses cryptographic hashes. Perhaps hashes wouldn't count?

-- 
boykin at pobox.com        http://pobox.com/~boykin        ICQ: 5118680
Key fingerprint = 159A FA02 DF12 E72F B68F  5B2D C368 3BCA 36D7 CF28
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20010927/199e4dcc/attachment.pgp>

Reply via email to