1996-01-26 - Re: Why is blowfish so slow? Other fast algorithms?

Header Data

From: Bill Stewart <stewarts@ix.netcom.com>
To: cypherpunks@toad.com
Message Hash: 9d18b0ad39d2262747dfb7621c9e2cc943dfd31452c3c78fe2330a47b7762093
Message ID: <199601260940.BAA26380@ix7.ix.netcom.com>
Reply To: N/A
UTC Datetime: 1996-01-26 10:41:18 UTC
Raw Date: Fri, 26 Jan 1996 18:41:18 +0800

Raw message

From: Bill Stewart <stewarts@ix.netcom.com>
Date: Fri, 26 Jan 1996 18:41:18 +0800
To: cypherpunks@toad.com
Subject: Re: Why is blowfish so slow? Other fast algorithms?
Message-ID: <199601260940.BAA26380@ix7.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


>> At 07:32 PM 1/23/96 -0500, David A Wagner wrote:
>> >If you want authentication, you must use a crypto-strength MAC.
>> >Encryption (be it RC4, DES, etc.) is not enough.

Are there any simple but crypto-strong hash functions?
I've been thinking about doing a "One Page Privacy" program,
using the 3-line RSA, 10-line RC4, and some glue,
but using a separate MD5 program seemed like cheating
(even though the 3-line RSA uses dc :-).  
I was thinking about using RC4 in some feedback mode as a MAC,
but it sounds like that's not secure enough?  Is there anything
else that's short?  MD5 requires too much code.
#--
#				Thanks;  Bill
# Bill Stewart, stewarts@ix.netcom.com, Pager/Voicemail 1-408-787-1281
#
# "Eternal vigilance is the price of liberty" used to mean us watching
# the government, not the other way around....






Thread