On Mon, Apr 28, 2008 at 01:33:39PM -0700, Jim McCoy wrote:

> First "problem" here is that you have lost the "crypto" properties of  
> the hash and security has dropped to the level of whatever OPHF()  
> provides. 

Could you explain how one would find a collision or pre-image of the
construction I described? (Or, another loss of crypto property common
to cryptographic hash functions, other than the loss of
psuedorandomness as mentioned). I must admit I'm rather confused what
you mean by the crypto properties being lost...

-Jack
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to