[145553] in cryptography@c2.net mail archive
Re: Hashing messages with lengths between 32 and 128 bytes is one
daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Sun Aug 1 13:06:12 2010
Date: Sun, 1 Aug 2010 18:46:29 +0300 (EEST)
From: Sampo Syreeni <decoy@iki.fi>
To: Paul <paulcrossberg@123mail.org>
cc: cryptography@metzdowd.com
In-Reply-To: <1280487079.32221.1387499913@webmail.messagingengine.com>
X-SA-Exim-Mail-From: decoy@iki.fi
On 2010-07-30, Paul wrote:
> Deterministically generated and cryptographically strong random
> numbers are used in tens of NIST Approved Algorithms. They are
> constructed by using an approved hash algorithm, and there, hashing is
> performed over relatively short messages from 32 to 128 bytes. [...]
Do not forget protocol replies either. The best protocols usually cut
down the overhead to a minimum, either because of analyzability, or more
commonly because of speed/latency. That means that cryptographically
securing the *very* best protocols also implies various cryptographic
primitives on very short messages.
--
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com