On 12/03/2010 10:48 AM, Serguey Zefirov wrote:
2010/12/3 Permjacov Evgeniy permea...@gmail.com:
Most of the time you can get away with usual block ciphers (and even
with weaker parameters). There is a scheme that transforms block
cipher into hash function:
2010/12/3 Permjacov Evgeniy permea...@gmail.com:
*/me wrote it into to_read list. The problem is, however, that block
ciphers are quite unfriendly to plain word8 streams. It is not a deadly
problem, but i'd like to avoid block collections.
All one-way hashes do block collections. This is
I may be missing something, but it is not clear to me if you want
cryptographic security. If you do, then the only safe choice
is to use a standard algorithm (or block cipher construction,
perhaps). Sorry if that's already what you are discussing -
I don't know whether there are any established
On 12/03/2010 11:40 AM, Serguey Zefirov wrote:
2010/12/3 Permjacov Evgeniy permea...@gmail.com:
*/me wrote it into to_read list. The problem is, however, that block
ciphers are quite unfriendly to plain word8 streams. It is not a deadly
problem, but i'd like to avoid block collections.
All
2010/12/4 Permjacov Evgeniy permea...@gmail.com:
near cryptographic) security. To quote Wikipedia again: The avalanche
effect is evident if, when an input is changed slightly (for example,
flipping a single bit) the output changes significantly (e.g., half
the output bits flip).
This simply
The data integrity checks is well-known problem. A common soluting is
use of 'checksums'. Most of them , however, are built in quite
obfuscated manner (like md5) that results in ugly and error-prone
implementations (see reference implementation for same md5).
So, the question is: is there a
2010/12/3 Permjacov Evgeniy permea...@gmail.com:
The data integrity checks is well-known problem. A common soluting is
use of 'checksums'. Most of them , however, are built in quite
obfuscated manner (like md5) that results in ugly and error-prone
implementations (see reference implementation
On 02/12/2010 09:17 PM, Permjacov Evgeniy wrote:
The data integrity checks is well-known problem. A common soluting is
use of 'checksums'. Most of them , however, are built in quite
obfuscated manner (like md5) that results in ugly and error-prone
implementations (see reference implementation
On 12/03/2010 12:33 AM, Serguey Zefirov wrote:
2010/12/3 Permjacov Evgeniy permea...@gmail.com:
The data integrity checks is well-known problem. A common soluting is
use of 'checksums'. Most of them , however, are built in quite
obfuscated manner (like md5) that results in ugly and error-prone
2010/12/3 Permjacov Evgeniy permea...@gmail.com:
Most of the time you can get away with usual block ciphers (and even
with weaker parameters). There is a scheme that transforms block
cipher into hash function:
http://en.wikipedia.org/wiki/CRHF#Hash_functions_based_on_block_ciphers
*/me wrote
10 matches
Mail list logo