From: Phil Karn <karn@qualcomm.com>
To: perry@imsi.com
Message Hash: 9d9ed89a123ca8f5e9382125eb846ac8908e61925706d94b58adb67eaf608ab2
Message ID: <199408280651.XAA13677@servo.qualcomm.com>
Reply To: <9408260027.AA05595@snark.imsi.com>
UTC Datetime: 1994-08-28 06:52:57 UTC
Raw Date: Sat, 27 Aug 94 23:52:57 PDT
From: Phil Karn <karn@qualcomm.com>
Date: Sat, 27 Aug 94 23:52:57 PDT
To: perry@imsi.com
Subject: Re: $10M breaks MD5 in 24 days
In-Reply-To: <9408260027.AA05595@snark.imsi.com>
Message-ID: <199408280651.XAA13677@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain
>Well, I suppose this demonstrates that the NSA knew what they were
>doing when they set the SHA's length to 160 bits. Let it never be said
>that they aren't right on top of everything...
On the other hand, I can't imagine that NSA is unaware that strong
cryptographic hash functions designed for authentication are also
useful building blocks for a confidentiality cipher. Which might make
them less than wholly enthusiastic about doing their best on a public
standard like SHA.
Caveat emptor NSA. (John Cleese, if you're out there, feel free to
correct my Latin).
Phil
Return to September 1994
Return to “Phil Karn <karn@qualcomm.com>”