[16001] in cryptography@c2.net mail archive
Re: More problems with hash functions
daemon@ATHENA.MIT.EDU (Daniel Carosone)
Wed Aug 25 15:45:30 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 25 Aug 2004 18:10:57 +1000
From: Daniel Carosone <dan@geek.com.au>
To: Hal Finney <hal@finney.org>
Cc: jerrold.leichter@smarts.com, cryptography@metzdowd.com
In-Reply-To: <20040824162101.8AB3257E2A@finney.org>
--u65IjBhB3TIa72Vp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
My immediate (and not yet further considered) reaction to the
description of Joux' method was that it might be defeated by something
as simple as adding a block counter to the input each time.
I any case, I see it as a form of dictionary attack, and wonder
whether the same kinds of techniques wouldn't help.
--
Dan.
--u65IjBhB3TIa72Vp
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (NetBSD)
iD8DBQFBLEmREAVxvV4N66cRApuJAKDSNSR4YbKXJm8+F8pFO6iHAmQ/PgCg4lOU
SbOqUfk8ISH/LSUiJAg2fPk=
=rSoz
-----END PGP SIGNATURE-----
--u65IjBhB3TIa72Vp--
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com