[18855] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Symmetric ciphers as hash functions

daemon@ATHENA.MIT.EDU (Whyte, William)
Mon Nov 7 10:27:38 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 7 Nov 2005 09:49:52 -0500
From: "Whyte, William" <WWhyte@ntru.com>
To: "cyphrpunk" <cyphrpunk@gmail.com>,
	"Arash Partow" <arash@partow.net>
Cc: <cryptography@metzdowd.com>

> If the data is too big, break it up into pieces and chain these
> constructions together. The output of one block becomes the input "IV"
> of the next block.

I think you mean input *key*. This is essentially the Matyas-Meyer-Oseas =

construction, although they define it across two blocks because they=20
only had DES (and hence a 64-bit block size) to work with.

William

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post