[25683] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: picking a hash function to be encrypted

daemon@ATHENA.MIT.EDU (James A. Donald)
Mon May 15 20:57:27 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 16 May 2006 10:33:06 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: EKR <ekr@rtfm.com>
Cc: "Travis H." <solinym@gmail.com>,
	Cryptography <cryptography@metzdowd.com>
In-Reply-To: <86ves8dvrp.fsf@romeo.rtfm.com>

     --
"Travis H." <solinym@gmail.com> writes:
 >> So...
 >>
 >> Suppose I want a function to provide integrity and
 >> authentication, and that is to be combined with a
 >> stream cipher (as is the plaintext).  I believe that
 >> authentication is free once I have integrity given
 >> the fact that the hash value is superencrypted using
 >> the stream cipher, whose key is shared by only the
 >> sender and recipient.

Eric Rescorla wrote:
 > It's not safe to use a hash function this way if the
 > content is known to the attacker.

The content therefore should always contain something
random - which other parts of the protocol usually
require for other reasons.

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      j4gjR2yE9L2n/vvjYFQUivo5ojBm6HCmxw83+X+g
      4016yUOsGdYzWmpwqKkShf8kATzoWg5BesEp42JuD

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post