-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> 
> > SHA is, I think, the current gold standard
> 
> SHA1 is *very* much the same as MD5 - the only thing that it gives us is a
> bigger key-space. Which thinking about it might well be reason enough to use 
> it.
> As a side note the first version of SHA was 'corrected' by the NSA.
Not true.  And you're deliberately trying to cast doubt on it by that last
(cough) comment.  SHA1 uses an expand transformation that starts the
avalanch effect much earlier than in MD5.  Also the output of each step is
used as input into the next, which also makes each bit more relavant to
the entire hash.  
  A bigger key space is also a big deal.  It makes brute force attacks
much more difficult.
  The NSA added a left circular shift of one bit.  I happen to agree with
the decision, as it should make correlation effects less likely as the
data passes through each round.

> I would currently suggest DSA for public-key crypto because of patent issues.
> It's slow than RSA. The RSA patent expires (in the US) on 20th Sep 2000. I
> don't know about other countries. Then there are the eliptic-curve 
> cryptosystems
> but I think that they are too new to trust (but they are doing well).
I agree here, assuming we use pubkey algorithms in the server.  More
likely though, we will be using it only perhaps for key exchange of
session keys.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5AKTfpXyM95IyRhURAtAiAJ9w4CR+xlhDzDj/kmgXkb9eahefWgCbBua5
xz6oTi4rpjsXz6b650Nv5Mk=
=ClyB
-----END PGP SIGNATURE-----


_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to