[11244] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (Jack Lloyd)
Mon Jul 29 16:30:54 2002

Date: Mon, 29 Jul 2002 16:24:36 -0400 (EDT)
From: Jack Lloyd <lloyd@acm.jhu.edu>
To: David Wagner <daw@cs.berkeley.edu>
Cc: <cryptography@wasabisystems.com>
In-Reply-To: <200207291943.g6TJhmJ11557@mozart.cs.berkeley.edu>

On Mon, 29 Jul 2002, David Wagner wrote:

> > DES, being extremely hardware friendly, can be (ab)used to
> > make a strong one-way hash.  (E.g., raw input into both key and data maps
> > 56+64 -> uniformly distributed 64 bits.)
>
> However, when used in this way, DES is not an especially good hash function.
> For instance, it is easy to find collisions, to find pre-images, and so on.

Somewhat related to that, are there any block cipher->hash function methods
that are actually secure? Every one I've ever read about seems to have been
broken.

Regards,
  Jack


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post