From: Jim Gillogly <jim@rand.org>
To: cypherpunks@toad.com
Message Hash: a200acea052cd6e1189aaaf78b62887b618bf51520aba979dc53b962d258749d
Message ID: <9404281639.AA17753@mycroft.rand.org>
Reply To: <whjjVlu00awIAQG14f@andrew.cmu.edu>
UTC Datetime: 1994-04-28 16:39:56 UTC
Raw Date: Thu, 28 Apr 94 09:39:56 PDT
From: Jim Gillogly <jim@rand.org>
Date: Thu, 28 Apr 94 09:39:56 PDT
To: cypherpunks@toad.com
Subject: SHA and Capstone [Re: Liberating Schneier's Code?]
In-Reply-To: <whjjVlu00awIAQG14f@andrew.cmu.edu>
Message-ID: <9404281639.AA17753@mycroft.rand.org>
MIME-Version: 1.0
Content-Type: text/plain
> Matthew J Ghio <mg5n+@andrew.cmu.edu> writes:
> Capstone chips do not use MD5. The algorithm in question was the
> gubmint's Secure Hash Algorythm, which is not the same as MD5. I don't
> think capstone uses SHA anyway...
Yes, Capstone uses SHA. I append a chunk from the most recent NIST
Capstone release. Do we start calling it SHA-1? Will Capstone chips
with SHA-2 interoperate with the ones already burned?
Hmm.
Jim Gillogly
7 Thrimidge S.R. 1994, 16:37
_______________________________________________________________________
CAPSTONE CHIP TECHNOLOGY
CAPSTONE is an NSA developed, hardware oriented, cryptographic
device that implements the same cryptographic algorithm as the
CLIPPER chip. In addition, the CAPSTONE chip includes the
following functions:
1. The Digital Signature Algorithm (DSA) proposed by NIST
as a Federal Information Processing Standard (FIPS);
2. The Secure Hashing Algorithm (SHA) recently approved as
FIPS 180;
3. A Key Exchange Algorithm based on a public key
exchange;
4. A general purpose exponentiation algorithm;
5. A general purpose, random number generator which uses a
pure noise source.
_______________________________________________________________________
Return to April 1994
Return to “Peter Wayner <pcw@access.digex.net>”