[8631] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: secure hash modes for rijndael

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Mon Apr 2 17:24:55 2001

From: "Steven M. Bellovin" <smb@research.att.com>
To: Pete Chown <Pete.Chown@skygate.co.uk>
Cc: cryptography@wasabisystems.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Mon, 02 Apr 2001 17:11:45 -0400
Message-Id: <20010402211145.600A335C42@berkshire.research.att.com>

In message <20010402111524.B13595@hyena.skygate.co.uk>, Pete Chown writes:

>On the subject of these hash functions...  I looked at some benchmark
>figures and SHA-256 is not substantially faster than Rijndael-256 with
>Davies-Meyer.  I wonder why there was so much energy put into the AES
>process, and then SHA-256 was given to us by the NSA with no public
>review, almost as an afterthought.
>
>

I asked some NIST folks that question.  Their answer was that they 
didn't have the resources to run two large, public efforts 
simultaneously.  Hash functions induce much less public paranoia than 
do encryption algorithms; few people think that NSA wants to forge 
hashes.

The reason for SHA-256 is to provide O(2^128) security, comparable to 
that of AES.  SHA-384 and SHA-512 are complements to the longer key 
lengths available with AES.  There's going to be a revised digital 
signature standard coming soon, partly to match the new hash functions 
and partly because of Bleichenbacher's attack on DSA.


		--Steve Bellovin, http://www.research.att.com/~smb





---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post