1994-04-28 - SHA and Capstone [Re: Liberating Schneier’s Code?]

Header Data

From: Jim Gillogly <jim@rand.org>
To: cypherpunks@toad.com
Message Hash: a200acea052cd6e1189aaaf78b62887b618bf51520aba979dc53b962d258749d
Message ID: <9404281639.AA17753@mycroft.rand.org>
Reply To: <whjjVlu00awIAQG14f@andrew.cmu.edu>
UTC Datetime: 1994-04-28 16:39:56 UTC
Raw Date: Thu, 28 Apr 94 09:39:56 PDT

Raw message

From: Jim Gillogly <jim@rand.org>
Date: Thu, 28 Apr 94 09:39:56 PDT
To: cypherpunks@toad.com
Subject: SHA and Capstone [Re: Liberating Schneier's Code?]
In-Reply-To: <whjjVlu00awIAQG14f@andrew.cmu.edu>
Message-ID: <9404281639.AA17753@mycroft.rand.org>
MIME-Version: 1.0
Content-Type: text/plain



> Matthew J Ghio <mg5n+@andrew.cmu.edu> writes:
> Capstone chips do not use MD5.  The algorithm in question was the
> gubmint's Secure Hash Algorythm, which is not the same as MD5.  I don't
> think capstone uses SHA anyway...

Yes, Capstone uses SHA.  I append a chunk from the most recent NIST
Capstone release.  Do we start calling it SHA-1?  Will Capstone chips
with SHA-2 interoperate with the ones already burned?

Hmm.

	Jim Gillogly
	7 Thrimidge S.R. 1994, 16:37
_______________________________________________________________________
		    CAPSTONE CHIP TECHNOLOGY

CAPSTONE is an NSA developed, hardware oriented, cryptographic
device that implements the same cryptographic algorithm as the
CLIPPER chip.  In addition, the CAPSTONE chip includes the
following functions:

     1.   The Digital Signature Algorithm (DSA) proposed by NIST
	  as a Federal Information Processing Standard (FIPS);

     2.   The Secure Hashing Algorithm (SHA) recently approved as
	  FIPS 180;

     3.   A Key Exchange Algorithm based on a public key
	  exchange;

     4.   A general purpose exponentiation algorithm;

     5.   A general purpose, random number generator which uses a
	  pure noise source.
_______________________________________________________________________





Thread