[cryptography] HMAC over messages digest vs messages

2011-11-02 Thread Leandro Meiners
Hi List! I was wondering if anybody could give me some pointers as to papers or books that discuss the advantages/disadvantages of computing an HMAC of a message versus previously computing a hash of the message and then calculating the HMAC of the hash. My initial thoughts are that there isn't

Re: [cryptography] HMAC over messages digest vs messages

2011-11-02 Thread Jack Lloyd
On Wed, Nov 02, 2011 at 04:25:30PM -0300, Leandro Meiners wrote: Hi List! I was wondering if anybody could give me some pointers as to papers or books that discuss the advantages/disadvantages of computing an HMAC of a message versus previously computing a hash of the message and then

Re: [cryptography] HMAC over messages digest vs messages

2011-11-02 Thread Marsh Ray
On 11/02/2011 02:33 PM, Jack Lloyd wrote: It seems like it would be harder (or at least not easier) to find a collision or preimage for HMAC with an unknown key than a collision or preimage for an unkeyed hash, so using HMAC(H(m)) allows for an avenue of attack that HMAC(m) would not, namely

Re: [cryptography] HMAC over messages digest vs messages

2011-11-02 Thread Rose, Greg
On 2011 Nov 2, at 12:25 , Leandro Meiners wrote: Hi List! I was wondering if anybody could give me some pointers as to papers or books that discuss the advantages/disadvantages of computing an HMAC of a message versus previously computing a hash of the message and then calculating the

Re: [cryptography] HMAC over messages digest vs messages

2011-11-02 Thread Jon Callas
On Nov 2, 2011, at 12:59 PM, Leandro Meiners wrote: I thought of that, but I could not convince myself because it seems to depend on the particular application. For example, lets assume the following scenario: m is a message that it authenticated by the HMAC. For example, in the