[147206] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] The paranoid approach to crypto-plumbing

daemon@ATHENA.MIT.EDU (Bill Frantz)
Tue Sep 17 20:31:54 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 17 Sep 2013 17:27:52 -0700
From: Bill Frantz <frantz@pwpconsult.com>
To: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <31F72314-5674-4717-A322-AC64C19576F8@lrw.com>
Cc: John Kelsey <crypto.jmk@gmail.com>,
	"cryptography@metzdowd.com List" <cryptography@metzdowd.com>,
	"Perry E. Metzger" <perry@piermont.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 9/17/13 at 4:18 PM, leichter@lrw.com (Jerry Leichter) wrote:

>MAC'ing the actual data always seemed more "logical" to me, but 
>once you look at the actual situation, it no longer seems like 
>the right thing to do.

When I chose MAC then encrypt I was using the MAC to check the 
crypto code. CRC would have worked too, but the MAC was free. (I 
really don't trust my own code very much.)

Cheers - Bill

-------------------------------------------------------------------------
Bill Frantz        | The first thing you need when  | Periwinkle
(408)356-8506      | using a perimeter defense is a | 16345 
Englewood Ave
www.pwpconsult.com | perimeter.                     | Los Gatos, 
CA 95032

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post