[18071] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: draft paper: "Deploying a New Hash Algorithm"

daemon@ATHENA.MIT.EDU (Steve Furlong)
Thu Aug 4 16:24:53 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 4 Aug 2005 10:23:55 -0400
From: Steve Furlong <demonfighter@gmail.com>
Reply-To: Steve Furlong <demonfighter@gmail.com>
To: cryptography@metzdowd.com
In-Reply-To: <4.3.2.7.1.20050804003100.046a7110@mail.alten.org>

> [Moderator's note: ... attackers are often cleverer than protocol
> designers. ...

Is that true? Or is it a combination of

(a) a hundred attackers for every designer, and
(b) vastly disparate rewards: continued employment and maybe some
kudos for a designer or implementer, access to $1,000,000,000 of bank
accounts for an attacker


SRF

--=20
There are no bad teachers, only defective children.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post