[369] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Q: security of 2-barreled hashing

daemon@ATHENA.MIT.EDU (Lawrence C. Stewart)
Mon Mar 17 15:10:19 1997

Date: Mon, 17 Mar 1997 12:59:12 -0500
To: Hal Finney <hal@rain.org>, coderpunks@toad.com, cryptography@c2.net
From: "Lawrence C. Stewart" <stewart@openmarket.com>

I'm with you now.  I had in mind that that these were keyed hashes 
that were signatures in themselves, rather than hashes used
as input to the signature algorithm.

We're talking about:

m - message
H1(m) - first hash algorithm
H2(m) - second hash algorithm
S(H1(m), H2(m)) - signature algorithm

with a special case where H2(m) is CRC or some such.

-Larry


home help back first fref pref prev next nref lref last post