Ah yes, I had heard about the attack on SHA and had read about it,
but it didn't seem to be that practical.

SHA is not patented:

http://grouper.ieee.org/groups/1363/P1363/letters/NIST.txt

Actually, regardless of the cipher you use, unless you have
a truly random source of numbers, your going to undermine the
strength of your encryption.  For an embedded system, such a
thing has to be designed in from the get-go, as a software
PRNG is generally nowhere near good enough.

The AMD and Intel CPU's both have hardware random number
generators on-chip.  That is, the most advanced and expensive
CPUs do.  I don't know that these are in common use among
embedded systems yet, though.

Ted

>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED] Behalf Of Vin McLellan
>Sent: Wednesday, July 13, 2005 12:28 AM
>To: openssl-users@openssl.org
>Subject: RE: Algorithm licensing
>
>
>Hi Mat, Ted:
>
>RC5 was invented by MIT Prof Ron Rivest in 1994 for RSA
>Security, and RSA
>received a US patent for RC5 in May of 1997.  RSA licenses RC5
>separately
>-- as well as part of its BSAFE SDKs (including the BSAFE
>Crypto-C Micro
>Edition, and BSAFE SSL-C Micro Edition:.) See:
><http://tinyurl.com/aeosg>.
>
>RSA never patented or otherwise restricted the use of Rivest's
>hashes: MD2,
>MD4, and MD5.  Over the years, however, the integrity of each
>of these has
>been undermined by advances in cryptanalytic research.  As far back as
>1996, RSA Labs publicly urged developers to use the 160-bit SHA-1 hash,
>instead of MD5, and to plan for the migration of existing MD5
>implementations.
>
>Further research into MD5 vulnerabilities has led RSA to bluntly and
>repeatedly declare MD5 "broken" and insecure.
>
>I don't know what your alternative are in OpenSSL, but reports
>earlier this
>year about a new attack on the 160-bit SHA-1 by Xiaoyun Wang,
>Yiqun Lisa
>Yin, and Hongbo Yu led many developers to shift to SHA-256 (and
>to call for
>a major AES-style development effort to explore alternative
>constructs for
>one-way functions.)
>
>RSA Labs, for which I've been a consultant for many years, published a
>couple of summary notes on the SHA-1 developments
>at:<http://www.rsasecurity.com/rsalabs/>
>
>Hope this helps.
>
>Suerte,
>
>                  _Vin
>
>--------- in response to ---------------------------------------------
>
>Ted Mittelstaedt <tedm_at_toybox.placo.com>  wrote:
>>
>>md5 is not patented.  des and 3des the patent expired.  Blowfish was
>>originally published
>>not patented.  That's all I know.  With Cisco IPSec work just
>about all
>>configs use md5, sha,
>>des and 3des and Cisco isn't known for liking to pay royalties to
>>anyone.  If I were you I
>>would stick with md5, des and 3des.
>>
>>Ted
>>
>>>-----Original Message-----
>>>From: [EMAIL PROTECTED]
>>>[mailto:[EMAIL PROTECTED] Behalf Of Kramer, Mat
>>>Sent: Monday, July 11, 2005 1:34 PM
>>>To: openssl-users@openssl.org
>>>Subject: Algorithm licensing
>>>
>>>Hello,
>>>
>>>
>>>
>>>We are using OpenSSL in an embedded device.  I have been told
>that some
>>>of the cipher suites include patented algorithms that must be
>>>licensed.  The OpenSSL FAQ is intentionally vague about what
>algorithms
>>>are protected, although it recommends a specific
>configuration to remove
>>>RC5, IDEA and MDC2.  Are these the only three that are protected?  Is
>>>there anywhere I can find out definitively what algorithms
>are protected?
>>>
>>>
>>>
>>>Thanks,
>>>
>>>
>>>
>>>-Mat
>>
>>
>
>______________________________________________________________________
>OpenSSL Project                                 http://www.openssl.org
>User Support Mailing List                    openssl-users@openssl.org
>Automated List Manager                           [EMAIL PROTECTED]
>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to