[16001] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: More problems with hash functions

daemon@ATHENA.MIT.EDU (Daniel Carosone)
Wed Aug 25 15:45:30 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 25 Aug 2004 18:10:57 +1000
From: Daniel Carosone <dan@geek.com.au>
To: Hal Finney <hal@finney.org>
Cc: jerrold.leichter@smarts.com, cryptography@metzdowd.com
In-Reply-To: <20040824162101.8AB3257E2A@finney.org>


--u65IjBhB3TIa72Vp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

My immediate (and not yet further considered) reaction to the
description of Joux' method was that it might be defeated by something
as simple as adding a block counter to the input each time.

I any case, I see it as a form of dictionary attack, and wonder
whether the same kinds of techniques wouldn't help.

--
Dan.

--u65IjBhB3TIa72Vp
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (NetBSD)

iD8DBQFBLEmREAVxvV4N66cRApuJAKDSNSR4YbKXJm8+F8pFO6iHAmQ/PgCg4lOU
SbOqUfk8ISH/LSUiJAg2fPk=
=rSoz
-----END PGP SIGNATURE-----

--u65IjBhB3TIa72Vp--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post