Pues parece que la gente del NIST es bastante prevenida y no solo
han seleccionado el AES como sustituto de DES sino que tambien
han ampliado el tamaņo de las funciones Hash (SHA-2). Pero
que nadie se emociene demasido. Estos nuevos algoritmos no
tienen un valor practico inmediato ya que SHA-1 es suficientemente
seguro. Se trata solo de prepararse para el futuro.

Saludos
Oscar Conesa
Dtor Tecnico de Feste

>
> FYI,
>
> NIST has just posted a white paper that specifies hashing algorithms
> (SHA-256, SHA-384, and SHA-512) that are intended to provide security
> similar to that of the three AES key sizes. Information can be found at
> <http://www.nist.gov/sha/>.
>
> These algorithms "will be proposed in a draft Federal Information
> Processing Standard (FIPS) in 2001. These algorithms are being made
> available for information purposes prior to the publication of the draft
> FIPS. SHA-256 is a 256-bit hash function that is intended to provide 128
> bits of security against collision attacks, and SHA-512 is a 512-bit hash
> function that is intended to provide 256 bits of security. A 384-bit hash
> may be obtained by truncating the SHA-512 output."
>
> The web site has the NIST contact points.
>
> One side note about AES: http://csrc.nist.gov/csor/algorithms.htm contains
> the object identifiers and ASN.1 type definitions for AES parameters for
> protocols built on ASN.1.  The OIDs for the new hash algorithms will follow
> next week.
>
> Thanks,
>
> Tim Polk
>

*******************************************************
Moderador de la lista: Oscar Conesa, [EMAIL PROTECTED]
Web oficial: http://www.comercio-electronico/pki
.
Para darse de baja:
Enviar un mail a <[EMAIL PROTECTED]>
y en el cuerpo del mensaje:
UNSUBSCRIBE PKI
*******************************************************

Reply via email to