[1214] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: 3des question

daemon@ATHENA.MIT.EDU (Richard Basch)
Mon May 20 23:19:50 1996

Date: Mon, 20 May 1996 23:18:34 -0400
To: perry@piermont.com
Cc: Marc Horowitz <marc@MIT.EDU>, krbdev@MIT.EDU
In-Reply-To: <199604181403.KAA08241@jekyll.piermont.com>
From: "Richard Basch" <basch@lehman.com>

I realize I shouldn't do this (playing amateur cryptographer, that is)...

I have started to implement 3des, using SHA, and HMAC-SHA in Kerberos
V5.  I wrote my HMAC-SHA implementation based on the published I-D for
ipsec, and it appears to be using a 64-byte padding.  Doesn't HMAC
recommend that the padding be sufficiently large to act as a general
confounder for the message (eg. generally the block size that the digest
algorithm works on)?  If so, isn't the appropriate padding size for
HMAC-SHA 80 bytes instead of 64 bytes?

Anyway, if you could let me know what the appropriate padding size
should be, I would be greatly appreciated.  Also, if there are any other
differences from the published I-D, I would greatly appreciate hearing
about them.  (I have also sent a query, not citing the ipsec I-D, to
Hugo.)

Thanks.
-- 
Richard Basch                   
Sr. Developer/Analyst, DSO      URL: http://web.mit.edu/basch/www/home.html
Lehman Brothers, Inc.           Email: basch@lehman.com, basch@mit.edu
101 Hudson St., 38th Floor      Fax:   +1-201-524-5828
Jersey City, NJ 07302-3988      Voice: +1-201-524-5049

home help back first fref pref prev next nref lref last post