From: hallam@w3.org
To: Simon Spero <cypherpunks@toad.com
Message Hash: 76dfc294e7dcdddb578ff0536f6dcd180abf869905a7a0961c6bdac0b47c60c3
Message ID: <9510302351.AA28243@zorch.w3.org>
Reply To: <Pine.SOL.3.91.951030101221.319D-100000@chivalry>
UTC Datetime: 1995-11-02 01:28:57 UTC
Raw Date: Thu, 2 Nov 1995 09:28:57 +0800
From: hallam@w3.org
Date: Thu, 2 Nov 1995 09:28:57 +0800
To: Simon Spero <cypherpunks@toad.com
Subject: Re: Keyed-MD5, ITAR, and HTTP-NG
In-Reply-To: <Pine.SOL.3.91.951030101221.319D-100000@chivalry>
Message-ID: <9510302351.AA28243@zorch.w3.org>
MIME-Version: 1.0
Content-Type: text/plain
Simon,
Do not spec Keyed MD5, it is a complete looser. It is actually weak
against a number of attacks. There are much better constructs for creating
a keyed digest. There are much better ways of creating a digest than using
a hash fuinction as the base.
There is some work by Phil Rogaway on making keyed digest functions
which I strongly recommend people look at. I can post a paper on the subject if
people are interested.
Phill
Return to November 1995
Return to “Simon Spero <ses@tipper.oit.unc.edu>”