[252] in The Cryptographic File System users list
Random numbers & hashes for 256-bit keys?
daemon@ATHENA.MIT.EDU (Howard Gayle)
Sun Dec 9 12:01:52 2001
From owner-cfs-users@crypto.com Sun Dec 09 17:01:52 2001
Return-Path: <owner-cfs-users@crypto.com>
Delivered-To: cfs-mtg@CHARON.mit.edu
Received: (qmail 3351 invoked from network); 9 Dec 2001 17:01:51 -0000
Received: from mx.crypto.com (207.140.168.138)
by charon.mit.edu with SMTP; 9 Dec 2001 17:01:51 -0000
Received: (from majordomo@localhost)
by MultiHostMXServer (8.9.3/8.9.x4) id LAA19879
for cfs-users-list; Sun, 9 Dec 2001 11:47:03 -0500 (EST)
X-Authentication-Warning: mx.crypto.com: majordomo set sender to owner-cfs-users@crypto.com using -f
Received: from nsa.research.att.com (H-135-207-24-155.research.att.com [135.207.24.155])
by MultiHostMXServer (8.9.3/8.9.x4) with ESMTP id LAA27639
for <cfs-users@crypto.com>; Sun, 9 Dec 2001 11:47:01 -0500 (EST)
Received: from mail-green.research.att.com (mail-green.research.att.com [135.207.30.103]) by nsa.research.att.com (8.7.3/8.7.3) with ESMTP id LAA13894 for <cfs-users@nsa.research.att.com>; Sun, 9 Dec 2001 11:47:00 -0500 (EST)
Received: by mail-green.research.att.com (Postfix)
id A508B1E0C2; Sun, 9 Dec 2001 11:46:01 -0500 (EST)
Delivered-To: cfs-users@research.att.com
Received: from pimout4-int.prodigy.net (pimout4-ext.prodigy.net [207.115.63.103])
by mail-green.research.att.com (Postfix) with ESMTP id DE6831E05A
for <cfs-users@research.att.com>; Sun, 9 Dec 2001 11:46:00 -0500 (EST)
Received: from localhost (adsl-64-173-23-124.dsl.sntc01.pacbell.net [64.173.23.124])
by pimout4-int.prodigy.net (8.11.0/8.11.0) with ESMTP id fB9Gk0g56080
for <cfs-users@research.att.com>; Sun, 9 Dec 2001 11:46:00 -0500
To: cfs-users@research.att.com
Subject: Random numbers & hashes for 256-bit keys?
X-Mailer: Mew version 1.94.1 on Emacs 20.5 / Mule 4.0 (HANANOEN)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20011209095501D.hg0@sbcglobal.net>
Date: Sun, 09 Dec 2001 09:55:01 -0800
From: Howard Gayle <hg0@sbcglobal.net>
X-Dispatcher: imput version 990905(IM130)
Lines: 8
Sender: owner-cfs-users@crypto.com
Precedence: bulk
Suppose I hypothetically wanted to modify CFS to use AES
(Rijndael) with 256-bit keys.
Are existing /dev/random implementations based on SHA-1 or maybe
MD5 adequate for generating random 256-bit keys and 128-bit IVs?
Is there a better way?
How do I hash a pass phrase into a 256-bit key?