[25655] in cryptography@c2.net mail archive
Re: picking a hash function to be encrypted
daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon May 15 17:33:52 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: "Travis H." <solinym@gmail.com>
Cc: Cryptography <cryptography@metzdowd.com>
Date: Mon, 15 May 2006 07:38:11 +0200
In-Reply-To: <d4f1333a0605141756k7d259b45t5c91bc101bef1dbb@mail.gmail.com>
(Travis H.'s message of "Sun, 14 May 2006 19:56:17 -0500")
* Travis H.:
> IIUC, protocol design _should_ be easy, you just perform some
> finite-state analysis and verify that, assuming your primitives are
> ideal, no protocol-level operations break it.
Is this still true if you don't know your actual requirements?
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com