Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Alex Mauer
Mark H. Wood wrote: > The whole point of using a hash is to make it extremely unlikely that > either party could recover the plaintext unilaterally. It's like having a > vault with two different locks, and giving the keys to two different > people, to make abuse more difficult by requiring collusi

RE: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Ryan Malayter
[Alex L. Mauer] > Can you expand on this? > > How could the Name/address/ssn be retrieved from a hash of the same? > The data can be recovered from the hash because search space is small. Say you are looking for the SSN of a John Smith. Every large DB is bound to have someone named John Smith.

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Mark H. Wood
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, 25 May 2005, Alex L. Mauer wrote: > Florian Weimer wrote: > > * Sean C.: > >>The I.B.M. software would convert data on a person into a string of > >>seemingly > >>random characters, using a technique known as a one-way hash function. No > >>na

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Michael B. Trausch
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Sean C. wrote: > > I'm confused though. > I just read this article from the New York Times. As a newbie to encryption > and > hash algorithms I thought the idea behind hashes was that you couldn't > reconstruct the data from the hash. > You ca

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-25 Thread Alex L. Mauer
Florian Weimer wrote: * Sean C.: The I.B.M. software would convert data on a person into a string of seemingly random characters, using a technique known as a one-way hash function. No names, addresses or Social Security numbers, for example, would be embedded within the character string. F

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-25 Thread Florian Weimer
* Sean C.: > The I.B.M. software would convert data on a person into a string of seemingly > random characters, using a technique known as a one-way hash function. No > names, addresses or Social Security numbers, for example, would be embedded > within the character string. For most applications

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-24 Thread Alex Mauer
Sean C. wrote: > I'm confused though. > I just read this article from the New York Times. As a newbie to encryption > and > hash algorithms I thought the idea behind hashes was that you couldn't > reconstruct the data from the hash. You can't. But you can use the hash as a key to cross-referenc

IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-24 Thread Sean C.
http://tinyurl.com/dljdm See comment at bottom. Business/Financial Desk; SECTCTECHNOLOGY I.B.M. Software Aims to Provide Security Without Sacrificing Privacy By STEVE LOHR 624 words 24 May 2005 The New York Times Late Edition - Final 4 English Copyright 2005 The New York Times Company. All Rights