[147206] in cryptography@c2.net mail archive
Re: [Cryptography] The paranoid approach to crypto-plumbing
daemon@ATHENA.MIT.EDU (Bill Frantz)
Tue Sep 17 20:31:54 2013
X-Original-To: cryptography@metzdowd.com
Date: Tue, 17 Sep 2013 17:27:52 -0700
From: Bill Frantz <frantz@pwpconsult.com>
To: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <31F72314-5674-4717-A322-AC64C19576F8@lrw.com>
Cc: John Kelsey <crypto.jmk@gmail.com>,
"cryptography@metzdowd.com List" <cryptography@metzdowd.com>,
"Perry E. Metzger" <perry@piermont.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 9/17/13 at 4:18 PM, leichter@lrw.com (Jerry Leichter) wrote:
>MAC'ing the actual data always seemed more "logical" to me, but
>once you look at the actual situation, it no longer seems like
>the right thing to do.
When I chose MAC then encrypt I was using the MAC to check the
crypto code. CRC would have worked too, but the MAC was free. (I
really don't trust my own code very much.)
Cheers - Bill
-------------------------------------------------------------------------
Bill Frantz | The first thing you need when | Periwinkle
(408)356-8506 | using a perimeter defense is a | 16345
Englewood Ave
www.pwpconsult.com | perimeter. | Los Gatos,
CA 95032
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography