[16980] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [IP] One cryptographer's perspective on the SHA-1 result

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Thu Mar 3 18:51:30 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: cryptography@metzdowd.com
In-Reply-To: Your message of "Wed, 23 Feb 2005 19:48:01 EST."
             <BE428E71.1DD62%dave@farber.net> 
Date: Wed, 23 Feb 2005 21:37:25 -0500

Burt Kaliski posted the following to Dave Farber's IP list.  I was =

about to post something similar myself.

>Beyond that, it is now clear that the industry needs an open evaluation
>process -- like the Advanced Encryption Standard competition -- to estab=
lish
>a new hash function standard for the long term, or at least an alternati=
ve
>if SHA-256 and above turn out still to be good enough after review.
>

As he quite eloquently pointed out, we have a near-monoculture of hash =

algorithms.  Virtually every well-known hash algorithm, with the =

exception of Whirlpool, is derived from MD2/MD4/MD5.  At the time SHA-0 =

was released, in fact, there was a great deal of speculation that NSA =

had copied Rivest's framework to avoid disclosing any new principles =

for hash function construction.

I have no idea if that's true or not.  As we all know, even NSA found =

SHA more problematic than they would have hoped; witness the release of =

SHA-1 not all that long afterwards.

When NIST released SHA256/384/512 shortly after AES, but without a =

public competition, the word was that they didn't have the resources to =

run two simultaneous large-scale, open processes.  That's a fair =

statement, and given the choice between an openly-chosen encryption =

algorithm and an openly-chosen hash function I think most of us would =

have made the same decision.

I don't know if there's quite the need for open process for a hash =

function as there was for a secrecy algorithm.  The AES process, after =

all, had to cope with the legacy of Clipper and key escrow, to say =

nothing of the 25 years of DES paranoia that was only laid to rest by =

the reinvention of differential cryptanalysis.  (The Deep Crack machine =

only confirmed another part of the paranoia, of course, but the =

essential parameter it exploited -- key size -- was both obviously =

insufficient in 1979 and obviously sufficient from the requirements of =

the AES competition.)  It is clear, as Burt said, that we need a =

large-scale effort to produce new and better hash functions.  To try to =

repair the MD*/SHA* family is to risk the cry of "epicycles".

		--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post