[25655] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: picking a hash function to be encrypted

daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon May 15 17:33:52 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: "Travis H." <solinym@gmail.com>
Cc: Cryptography <cryptography@metzdowd.com>
Date: Mon, 15 May 2006 07:38:11 +0200
In-Reply-To: <d4f1333a0605141756k7d259b45t5c91bc101bef1dbb@mail.gmail.com>
	(Travis H.'s message of "Sun, 14 May 2006 19:56:17 -0500")

* Travis H.:

> IIUC, protocol design _should_ be easy, you just perform some
> finite-state analysis and verify that, assuming your primitives are
> ideal, no protocol-level operations break it.

Is this still true if you don't know your actual requirements?

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post