Re: Out of the Office

2005-03-18 Thread Brian Hurt
On Fri, 18 Mar 2005, Dunceor . wrote: YOU FUCKIN IDIOT. TURN THAT SHIT OF, THAT IS LIKE THE 10TH MAIL TODAY. some people just don't have the brains. Um, it's an automatically generated message. Which means spewing flames at them isn't going to help. Could we temporarily remove this person from

RE: [openssl-users] Re: The breaking of SHA1

2005-03-14 Thread Brian Hurt
On Mon, 14 Mar 2005, Ferdinand Prantl wrote: Hi, you may want to read yet another paper, where a different, faster method is introduced, than the chinese one (english): http://cryptography.hyperlink.cz/md5/MD5_collisions.pdf Careful. This is with MD5, a different (but still related) algorithm tha

Re: The breaking of SHA1

2005-03-14 Thread Brian Hurt
My point exactly. We don't need to panic- but I do think we need to start looking for alternatives. On Mon, 14 Mar 2005, Alicia da Conceicao wrote: Bruce Schneier said it best on his blog (dated 18 Feb 2005): Brian __ OpenSSL Pr

Re: The breaking of SHA1

2005-03-14 Thread Brian Hurt
Lecture warning. On Mon, 14 Mar 2005, alok wrote: Yeah, you need large key sizes- 128 bits keys just aren't enough (they allow birthday attacks to be computationally feasible). But I note that all the AES finalists went to 256 bit key sizes. This would put a birthday attack at about 128 bits of

Re: The breaking of SHA1

2005-03-14 Thread Brian Hurt
On Mon, 14 Mar 2005, alok wrote: IIRC, you can turn any private key crypto system into a hasing algorithm. Given an encryption function c = f(k, p) where c is the resulting ciphertext, k is the private key, and p is the plaintext, you can use it as a hash function s' = h(t, s) where s' is the n

Re: The breaking of SHA1

2005-03-14 Thread Brian Hurt
On Mon, 14 Mar 2005, alok wrote: I doubt many people would actually use it if they know it can be easily broken.. Like someone said on the list "hey everyone uses it, it must be secure" is the mental genere. Most people, including a depressingly large number of programmers, would probably cons

Newbie: Symmetric Key Cypto as Hasing Algo?

2005-03-11 Thread Brian Hurt
Pardon me if I'm beating an already dead horse here. But with the recent news on the breaking of MD-5, SHA-1, etc., I was wondering: is there a way for OpenSSL to use symmetric key ciphers as hashing algorithms? As I understand it, given a symmetric key cipher c = f(k,p) where c is the ciphert