[Cryptography] NIST Workshop on Elliptic Curve Cryptography Standards

Tony Arcieri bascule at gmail.com
Tue May 19 20:43:13 EDT 2015

On Tue, May 19, 2015 at 2:48 PM, Adrian McCullagh <amccullagh at live.com>

>  Further, I think the reason for the further reduction to 56 bit was for
> the introduction of a parity correction.
> I am unaware of the NSA being involved in any of this.

The NSA wanted 48-bits. IBM wanted 64-bits. So they split the difference at

"Parity bits" were used to explain the odd choice of 56-bits, but clearly 8
parity bits for 56-bits of data doesn't make a whole lot of sense.

You can read about it in Wikipedia, or for a more in-depth account, Steven
Levy's book "Crypto":


Tony Arcieri
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150519/1c8b01de/attachment.html>

More information about the cryptography mailing list