"Travis H." <[EMAIL PROTECTED]> writes:
>> How does one properly use a symmetric cipher as a cryptographic hash
>> function? I seem to be going around in circles.
>
> Isn't this is like asking a mechanic how to use a screwdriver as a hammer?

Not in the least. Building new strong tools by using older tools that
are known to be strong is part of the traditional cryptography mindset,
and there is nothing remotely wrong with it, provided it works. If
your attitude were correct, we wouldn't have constructs like HMAC,
would we?

Perry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to