[369] in cryptography@c2.net mail archive
Re: Q: security of 2-barreled hashing
daemon@ATHENA.MIT.EDU (Lawrence C. Stewart)
Mon Mar 17 15:10:19 1997
Date: Mon, 17 Mar 1997 12:59:12 -0500
To: Hal Finney <hal@rain.org>, coderpunks@toad.com, cryptography@c2.net
From: "Lawrence C. Stewart" <stewart@openmarket.com>
I'm with you now. I had in mind that that these were keyed hashes
that were signatures in themselves, rather than hashes used
as input to the signature algorithm.
We're talking about:
m - message
H1(m) - first hash algorithm
H2(m) - second hash algorithm
S(H1(m), H2(m)) - signature algorithm
with a special case where H2(m) is CRC or some such.
-Larry