[16070] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Implementation choices in light of recent attacks?

daemon@ATHENA.MIT.EDU (Jim McCoy)
Wed Sep 1 12:55:56 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: cryptography@metzdowd.com
From: Jim McCoy <mccoy@mad-scientist.com>
Date: Wed, 1 Sep 2004 09:26:34 -0700

After digesting the various bits of information and speculation on the 
recent breaks and partial attacks on various popular hash functions I 
am wondering if anyone has suggestions for implementation choices for 
someone needing a (hopefully) strong hash today, but who needs to keep 
the hash output size in the 128-192 bit range.  A cursory examination 
of Tiger seems to indicate that it uses a different methodology than 
the MDx & SHAx lines, does this mean that it does not suffer from the 
recent hash attacks?  Would a SHA256 that has its output chopped be 
sufficient?

Any suggestions would be appreciated.

Jim

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post