>From: Eric Rescorla <[EMAIL PROTECTED]> Sent: Jun 14, 2005 9:36 AM
>Subject: Re: Collisions for hash functions: how to exlain them to
>your boss
[Discussing the MD5 attacks and their practicality, especially the
recent postscript demonstration.]
...
>But everything you've just said applies equa
>From: Greg Rose <[EMAIL PROTECTED]>
>Sent: Jun 14, 2005 2:54 PM
>To: EKR <[EMAIL PROTECTED]>
>Cc: Ian G <[EMAIL PROTECTED]>, cryptography@metzdowd.com
>Subject: Re: expanding a password into many keys
...
>You know, the proof that HMAC is a good MAC requires that the
>*compression function* of th
>From: "Perry E. Metzger" <[EMAIL PROTECTED]>
>Sent: Jun 15, 2005 8:00 AM
>To: cryptography@metzdowd.com
>Subject: NIST Public Workshop on Cryptographic Hashes
[Discussing the NIST public hash function workshop.]
>> The workshop will be held on October 31 and November 1, 2005,
>> from 9 a.m.
http://cryptome.org/nist061405.txt
>From the document:
A vulnerability was recently identified in the NIST-approved
cryptographic hash algorithm, Secure Hash Algorithm-1 (SHA-1). In
response, NIST is announcing a public workshop to discuss this
vulnerability, assess the status of