[145553] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Hashing messages with lengths between 32 and 128 bytes is one

daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Sun Aug 1 13:06:12 2010

Date: Sun, 1 Aug 2010 18:46:29 +0300 (EEST)
From: Sampo Syreeni <decoy@iki.fi>
To: Paul <paulcrossberg@123mail.org>
cc: cryptography@metzdowd.com
In-Reply-To: <1280487079.32221.1387499913@webmail.messagingengine.com>
X-SA-Exim-Mail-From: decoy@iki.fi

On 2010-07-30, Paul wrote:

> Deterministically generated and cryptographically strong random 
> numbers are used in tens of NIST Approved Algorithms. They are 
> constructed by using an approved hash algorithm, and there, hashing is 
> performed over relatively short messages from 32 to 128 bytes. [...]

Do not forget protocol replies either. The best protocols usually cut 
down the overhead to a minimum, either because of analyzability, or more 
commonly because of speed/latency. That means that cryptographically 
securing the *very* best protocols also implies various cryptographic 
primitives on very short messages.
-- 
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post