Travis H. wrote:
On 7/11/06, Zooko O'Whielacronx <[EMAIL PROTECTED]> wrote:
I hope that the hash function designers will be aware that hash
functions are being used in more and more contexts outside of the
traditional digital signatures and MACs. These new contexts include
filesystems like ZFS
> - Original Message -
> From: "Zooko O'Whielacronx" <[EMAIL PROTECTED]>
...
> The AES competition resulted in a block cipher that was faster as
> well as safer than the previous standards. I hope that the next
> generation of hash functions achieve something similar, because for
> my
On 7/11/06, Zooko O'Whielacronx <[EMAIL PROTECTED]> wrote:
I hope that the hash function designers will be aware that hash
functions are being used in more and more contexts outside of the
traditional digital signatures and MACs. These new contexts include
filesystems like ZFS [3], decentralized
Zooko writes:
> By the way, the traditional practice of using a hash function as a
> component of a MAC should, in my humble opinion, be retired in favor of
> the Carter-Wegman alternative such as Poly-1305 AES [7].
This is a great topic where there are lots of pros and cons. The CW
MACs like U
Maybe you haven't heard but Tiger is being analysed against collision attack
At FSE 2006 Kelsey and Stefan Lucks presented a paper on Tiger
John Kelsey, Stefan Lucks: Collisions and Near-Collisions for
Reduced-Round Tiger, Preproceedings of FSE 2006.
Abstract:
We describe a collision-findin
Hal:
Thanks for the news about the planned NIST-sponsored hash function
competition. I'm glad to hear that it is in the works.
Yesterday I profiled my on-line data backup application [1] and
discovered that for certain operations one third of the time is spent in
SHA-1. For that reason, I'