[cryptography] rolling hashes, EDC/ECC vs MAC/MIC, etc.

2011-05-20 Thread travis+ml-rbcryptography
Hmm, after sending this to some of you I remembered this list :-) Just a quick thought, I noticed the other day that rsync uses a rolling MD4 hash or something like that to detect changes in a window of data. I wonder if A/V shouldn't use something similar? I assume MD4 is an outdated

Re: [cryptography] rolling hashes, EDC/ECC vs MAC/MIC, etc.

2011-05-20 Thread Zooko O'Whielacronx
On Fri, May 20, 2011 at 3:30 PM, travis+ml-rbcryptogra...@subspacefield.org wrote: I wonder if A/V shouldn't use something similar? What's A/V? I assume MD4 is an outdated choice - perhaps some cryppie needs to design a hash function that is specifically designed for a FIFO kind of window?  

Re: [cryptography] Point compression prior art?

2011-05-20 Thread Zooko O'Whielacronx
Dear Paul Crowley: How about the Compact Representation, section 4.2, of RFC 6090: http://www.rfc-editor.org/rfc/rfc6090.txt Is that the same point compression that you were looking for? Regards, Zooko ___ cryptography mailing list

Re: [cryptography] Point compression prior art?

2011-05-20 Thread Nico Williams
On Fri, May 20, 2011 at 5:40 PM, Paul Crowley p...@ciphergoth.org wrote: On 20/05/11 23:14, Zooko O'Whielacronx wrote: How about the Compact Representation, section 4.2, of RFC 6090: http://www.rfc-editor.org/rfc/rfc6090.txt Is that the same point compression that you were looking for?

Re: [cryptography] rolling hashes, EDC/ECC vs MAC/MIC, etc.

2011-05-20 Thread Nico Williams
On Fri, May 20, 2011 at 4:30 PM, travis+ml-rbcryptogra...@subspacefield.org wrote: Just a quick thought, I noticed the other day that rsync uses a rolling MD4 hash or something like that to detect changes in a window of data. A quick look around should tell you that it uses a rolling checksum

Re: [cryptography] Point compression prior art?

2011-05-20 Thread Paul Crowley
On 20/05/11 23:49, Nico Williams wrote: What about using Shcnorr's signature scheme with ECDH? Here's DJB talking about it in the context of his Curve25519, which uses the discard-y point compression technique: http://www.derkeiler.com/Newsgroups/sci.crypt/2006-08/msg01621.html This would