On Mon, Apr 28, 2008 at 01:33:39PM -0700, Jim McCoy wrote: > First "problem" here is that you have lost the "crypto" properties of > the hash and security has dropped to the level of whatever OPHF() > provides.
Could you explain how one would find a collision or pre-image of the construction I described? (Or, another loss of crypto property common to cryptographic hash functions, other than the loss of psuedorandomness as mentioned). I must admit I'm rather confused what you mean by the crypto properties being lost... -Jack _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
