[18822] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Symmetric ciphers as hash functions

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Nov 1 11:46:01 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: "Travis H." <solinym@gmail.com>
Cc: Arash Partow <arash@partow.net>, cryptography@metzdowd.com
From: "Perry E. Metzger" <perry@piermont.com>
Date: Tue, 01 Nov 2005 11:44:41 -0500
In-Reply-To: <d4f1333a0510312333k44e882e7l75adbff3a12b02c3@mail.gmail.com> (Travis
 H.'s message of "Tue, 1 Nov 2005 01:33:17 -0600")


"Travis H." <solinym@gmail.com> writes:
>> How does one properly use a symmetric cipher as a cryptographic hash
>> function? I seem to be going around in circles.
>
> Isn't this is like asking a mechanic how to use a screwdriver as a hammer?

Not in the least. Building new strong tools by using older tools that
are known to be strong is part of the traditional cryptography mindset,
and there is nothing remotely wrong with it, provided it works. If
your attitude were correct, we wouldn't have constructs like HMAC,
would we?

Perry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post