[146574] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Hashes into Ciphers (was Re: FIPS,

daemon@ATHENA.MIT.EDU (=?ISO-8859-1?Q?Joachim_Str=F6mberg)
Thu Sep 5 13:10:11 2013

X-Original-To: cryptography@metzdowd.com
Date: Thu, 05 Sep 2013 11:44:10 +0200
From: =?ISO-8859-1?Q?Joachim_Str=F6mbergson?= <Joachim@Strombergson.com>
To: cryptography@metzdowd.com, 
	Stephan Neuhaus <stephan.neuhaus@tik.ee.ethz.ch>
In-Reply-To: <52277E8D.10807@tik.ee.ethz.ch>
Reply-To: Joachim@Strombergson.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Aloha!

Stephan Neuhaus wrote:
> On 2013-09-04 16:37, Perry E. Metzger wrote:
>> Phil Karn described a construction for turning any hash function
>> into the core of a Feistel cipher in 1991. So far as I can tell,
>> such ciphers are actually quite secure, though impractically slow.
>> =

>> Pointers to his original sci.crypt posting would be appreciated, I =

>> wasn't able to find it with a quick search.
> =

> I remember having reviewed a construction by Peter Gutmann, called a =

> Message Digest Cipher, at around that time, which also turned a hash =

> function into a cipher.  I do remember that at that time I thought
> it was quite secure, but I was just a little puppy then.  Schneier
> reviews this construction in Applied Cryptography and can't find
> fault with it, but doesn't like it on principle ("using the hash
> function for something for which it is not intended").

Isn't this whole discussion basically the gist of DJB vs USA?

https://en.wikipedia.org/wiki/Snuffle

And today we have Salsa20 as a PRNG/stream cipher in eSTREAM.

The Salsa family of functions including ChaCha are compression functions
in counter mode to generate a keystream.

- -- =

Med v=E4nlig h=E4lsning, Yours

Joachim Str=F6mbergson - Alltid i harmonisk sv=E4ngning.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAlIoUmoACgkQZoPr8HT30QF6BwCgrbIFVv/ETFWjGGUxi27h6bWb
7usAoKNYs9PO1ENGD8jeSje3i6Hm+xml
=3D8rT0
-----END PGP SIGNATURE-----
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post