Re: hashes in p2p, was Re: switching from SHA-1 to Tiger ?

2006-07-12 Thread Ondrej Mikle
Travis H. wrote: On 7/11/06, Zooko O'Whielacronx <[EMAIL PROTECTED]> wrote: I hope that the hash function designers will be aware that hash functions are being used in more and more contexts outside of the traditional digital signatures and MACs. These new contexts include filesystems like ZFS

Re: switching from SHA-1 to Tiger ?

2006-07-12 Thread alex
> - Original Message - > From: "Zooko O'Whielacronx" <[EMAIL PROTECTED]> ... > The AES competition resulted in a block cipher that was faster as > well as safer than the previous standards. I hope that the next > generation of hash functions achieve something similar, because for > my

hashes in p2p, was Re: switching from SHA-1 to Tiger ?

2006-07-12 Thread Travis H.
On 7/11/06, Zooko O'Whielacronx <[EMAIL PROTECTED]> wrote: I hope that the hash function designers will be aware that hash functions are being used in more and more contexts outside of the traditional digital signatures and MACs. These new contexts include filesystems like ZFS [3], decentralized

Re: switching from SHA-1 to Tiger ?

2006-07-11 Thread "Hal Finney"
Zooko writes: > By the way, the traditional practice of using a hash function as a > component of a MAC should, in my humble opinion, be retired in favor of > the Carter-Wegman alternative such as Poly-1305 AES [7]. This is a great topic where there are lots of pros and cons. The CW MACs like U

Re: switching from SHA-1 to Tiger ?

2006-07-11 Thread Mads Rasmussen
Maybe you haven't heard but Tiger is being analysed against collision attack At FSE 2006 Kelsey and Stefan Lucks presented a paper on Tiger John Kelsey, Stefan Lucks: Collisions and Near-Collisions for Reduced-Round Tiger, Preproceedings of FSE 2006. Abstract: We describe a collision-findin

switching from SHA-1 to Tiger ?

2006-07-11 Thread Zooko O'Whielacronx
Hal: Thanks for the news about the planned NIST-sponsored hash function competition. I'm glad to hear that it is in the works. Yesterday I profiled my on-line data backup application [1] and discovered that for certain operations one third of the time is spent in SHA-1. For that reason, I'