[16075] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Implementation choices in light of recent attacks?

daemon@ATHENA.MIT.EDU (bear)
Wed Sep 1 15:49:48 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 1 Sep 2004 11:43:43 -0700 (PDT)
From: bear <bear@sonic.net>
To: Jim McCoy <mccoy@mad-scientist.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <B0C0E07C-FC33-11D8-A6CC-000A95BD758E@mad-scientist.com>



On Wed, 1 Sep 2004, Jim McCoy wrote:

>After digesting the various bits of information and speculation on the
>recent breaks and partial attacks on various popular hash functions I
>am wondering if anyone has suggestions for implementation choices for
>someone needing a (hopefully) strong hash today, but who needs to keep
>the hash output size in the 128-192 bit range.  A cursory examination
>of Tiger seems to indicate that it uses a different methodology than
>the MDx & SHAx lines, does this mean that it does not suffer from the
>recent hash attacks?  Would a SHA256 that has its output chopped be
>sufficient?
>
>Any suggestions would be appreciated.

I believe that SHA256 with its output cut to 128 bits will be
effective.  The simplest construction is to just throw away
half the bits.

			Bear

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post