picking a hash function to be encrypted

Florian Weimer fw at deneb.enyo.de
Mon May 15 01:38:11 EDT 2006


* Travis H.:

> IIUC, protocol design _should_ be easy, you just perform some
> finite-state analysis and verify that, assuming your primitives are
> ideal, no protocol-level operations break it.

Is this still true if you don't know your actual requirements?

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list