Re: Collisions for hash functions: how to exlain them to your boss

2005-06-15 Thread John Kelsey
>From: Eric Rescorla <[EMAIL PROTECTED]> Sent: Jun 14, 2005 9:36 AM >Subject: Re: Collisions for hash functions: how to exlain them to >your boss [Discussing the MD5 attacks and their practicality, especially the recent postscript demonstration.] ... >But everything you've just said applies equa

Re: expanding a password into many keys

2005-06-15 Thread John Kelsey
>From: Greg Rose <[EMAIL PROTECTED]> >Sent: Jun 14, 2005 2:54 PM >To: EKR <[EMAIL PROTECTED]> >Cc: Ian G <[EMAIL PROTECTED]>, cryptography@metzdowd.com >Subject: Re: expanding a password into many keys ... >You know, the proof that HMAC is a good MAC requires that the >*compression function* of th

Re: NIST Public Workshop on Cryptographic Hashes

2005-06-15 Thread John Kelsey
>From: "Perry E. Metzger" <[EMAIL PROTECTED]> >Sent: Jun 15, 2005 8:00 AM >To: cryptography@metzdowd.com >Subject: NIST Public Workshop on Cryptographic Hashes [Discussing the NIST public hash function workshop.] >> The workshop will be held on October 31 and November 1, 2005, >> from 9 a.m.

NIST Public Workshop on Cryptographic Hashes

2005-06-15 Thread Perry E. Metzger
http://cryptome.org/nist061405.txt >From the document: A vulnerability was recently identified in the NIST-approved cryptographic hash algorithm, Secure Hash Algorithm-1 (SHA-1). In response, NIST is announcing a public workshop to discuss this vulnerability, assess the status of