1994-04-28 - SHA and Capstone [Re: Liberating Schneier’s Code?]

Header Data

From: Jim Gillogly <jim@rand.org>
To: cypherpunks@toad.com
Message Hash: a200acea052cd6e1189aaaf78b62887b618bf51520aba979dc53b962d258749d
Message ID: <9404281639.AA17753@mycroft.rand.org>
Reply To: <whjjVlu00awIAQG14f@andrew.cmu.edu>
UTC Datetime: 1994-04-28 16:39:56 UTC
Raw Date: Thu, 28 Apr 94 09:39:56 PDT

Raw message

From: Jim Gillogly <jim@rand.org>
Date: Thu, 28 Apr 94 09:39:56 PDT
To: cypherpunks@toad.com
Subject: SHA and Capstone [Re: Liberating Schneier's Code?]
In-Reply-To: <whjjVlu00awIAQG14f@andrew.cmu.edu>
Message-ID: <9404281639.AA17753@mycroft.rand.org>
MIME-Version: 1.0
Content-Type: text/plain

> Matthew J Ghio <mg5n+@andrew.cmu.edu> writes:
> Capstone chips do not use MD5.  The algorithm in question was the
> gubmint's Secure Hash Algorythm, which is not the same as MD5.  I don't
> think capstone uses SHA anyway...

Yes, Capstone uses SHA.  I append a chunk from the most recent NIST
Capstone release.  Do we start calling it SHA-1?  Will Capstone chips
with SHA-2 interoperate with the ones already burned?


	Jim Gillogly
	7 Thrimidge S.R. 1994, 16:37

CAPSTONE is an NSA developed, hardware oriented, cryptographic
device that implements the same cryptographic algorithm as the
CLIPPER chip.  In addition, the CAPSTONE chip includes the
following functions:

     1.   The Digital Signature Algorithm (DSA) proposed by NIST
	  as a Federal Information Processing Standard (FIPS);

     2.   The Secure Hashing Algorithm (SHA) recently approved as
	  FIPS 180;

     3.   A Key Exchange Algorithm based on a public key

     4.   A general purpose exponentiation algorithm;

     5.   A general purpose, random number generator which uses a
	  pure noise source.