[18855] in cryptography@c2.net mail archive
RE: Symmetric ciphers as hash functions
daemon@ATHENA.MIT.EDU (Whyte, William)
Mon Nov 7 10:27:38 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 7 Nov 2005 09:49:52 -0500
From: "Whyte, William" <WWhyte@ntru.com>
To: "cyphrpunk" <cyphrpunk@gmail.com>,
"Arash Partow" <arash@partow.net>
Cc: <cryptography@metzdowd.com>
> If the data is too big, break it up into pieces and chain these
> constructions together. The output of one block becomes the input "IV"
> of the next block.
I think you mean input *key*. This is essentially the Matyas-Meyer-Oseas =
construction, although they define it across two blocks because they=20
only had DES (and hence a 64-bit block size) to work with.
William
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com