[18822] in cryptography@c2.net mail archive
Re: Symmetric ciphers as hash functions
daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Nov 1 11:46:01 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: "Travis H." <solinym@gmail.com>
Cc: Arash Partow <arash@partow.net>, cryptography@metzdowd.com
From: "Perry E. Metzger" <perry@piermont.com>
Date: Tue, 01 Nov 2005 11:44:41 -0500
In-Reply-To: <d4f1333a0510312333k44e882e7l75adbff3a12b02c3@mail.gmail.com> (Travis
H.'s message of "Tue, 1 Nov 2005 01:33:17 -0600")
"Travis H." <solinym@gmail.com> writes:
>> How does one properly use a symmetric cipher as a cryptographic hash
>> function? I seem to be going around in circles.
>
> Isn't this is like asking a mechanic how to use a screwdriver as a hammer?
Not in the least. Building new strong tools by using older tools that
are known to be strong is part of the traditional cryptography mindset,
and there is nothing remotely wrong with it, provided it works. If
your attitude were correct, we wouldn't have constructs like HMAC,
would we?
Perry
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com