From: “Deranged Mutant” <WlkngOwl@unix.asb.com>
To: EVERHART@Arisia.GCE.Com
Message Hash: 7da4db37719d2efdaefedc02b08124e089540089975f0a756d1c9ca85faaf33f
Message ID: <199607181505.LAA17741@unix.asb.com>
Reply To: N/A
UTC Datetime: 1996-07-18 18:56:28 UTC
Raw Date: Fri, 19 Jul 1996 02:56:28 +0800
From: "Deranged Mutant" <WlkngOwl@unix.asb.com>
Date: Fri, 19 Jul 1996 02:56:28 +0800
To: EVERHART@Arisia.GCE.Com
Subject: Re: Making encoding out of an authentication cipher
Message-ID: <199607181505.LAA17741@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain
On 17 Jul 96 at 19:36, EVERHART@Arisia.GCE.Com wrote:
> Had an interesting thought, maybe worth passing on for commentary.
>
> (...since "authentication" ciphers are considered "harmless" by
> those interested in spying on your info...)
>
> Suppose you have a secure hash function H(msg) that delivers a random
[..]
There's a section in Schneier's Applied Cryptography about using hash
algorithms for ciphers. There are several ways of doing this,
although some are stronger than others.
One you adapt the hash algorithm to a cipher, it's a cipher, not a
hash algorithm, and is regulated.
Rob
---
No-frills sig.
Befriend my mail filter by sending a message with the subject "send help"
Key-ID: 5D3F2E99 1996/04/22 wlkngowl@unix.asb.com (root@magneto)
AB1F4831 1993/05/10 Deranged Mutant <wlkngowl@unix.asb.com>
Send a message with the subject "send pgp-key" for a copy of my key.
Return to July 1996
Return to ““Deranged Mutant” <WlkngOwl@unix.asb.com>”
1996-07-18 (Fri, 19 Jul 1996 02:56:28 +0800) - Re: Making encoding out of an authentication cipher - “Deranged Mutant” <WlkngOwl@unix.asb.com>