Implementation choices in light of recent attacks?
Jim McCoy
mccoy at mad-scientist.com
Wed Sep 1 12:26:34 EDT 2004
After digesting the various bits of information and speculation on the
recent breaks and partial attacks on various popular hash functions I
am wondering if anyone has suggestions for implementation choices for
someone needing a (hopefully) strong hash today, but who needs to keep
the hash output size in the 128-192 bit range. A cursory examination
of Tiger seems to indicate that it uses a different methodology than
the MDx & SHAx lines, does this mean that it does not suffer from the
recent hash attacks? Would a SHA256 that has its output chopped be
sufficient?
Any suggestions would be appreciated.
Jim
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list