[prev in list] [next in list] [prev in thread] [next in thread]
List: gnupg-users
Subject: Re: weakness in sha 1
From: <vedaal () hush ! com>
Date: 2004-09-26 6:14:58
Message-ID: 200409260614.i8Q6EwEt015651 () mailserver2 ! hushmail ! com
[Download RAW message or body]
Atom 'Smasher' atom at suspicious.org,
on Sun Sep 26 07:11:54 CEST 2004, wrote:
> if dh/dsa can be modified to accept greater than 160 size and use sha
> 256, great, if not, then it might be prudent to look into a new hash
> design that would be non md5/non sha-1 based that would still allow
> dh/dsa signing at the 160 level
==============
] how about RIPEMD-160?
]100% compatible with DSS (DSA), already part of GnuPG and it's neither
]SHA
]nor MD5 based.
but is ripemd based, ;-)
for which a weakness is already demonstrated
see
http://eprint.iacr.org/2004/199.pdf
] even without a weakness in any flavors of SHA i'd like to see DSA
] (the scalable algorithm) formally adopted into larger varieties of
] DSS (the current standard) to allow larger hashes and larger keys.
i
] guess if]/when that happens DSS will become DSS-0 and larger
] variants will become DSS-1,
agree 100%
vedaal
Concerned about your privacy? Follow this link to get
secure FREE email: http://www.hushmail.com/?l=2
Free, ultra-private instant messaging with Hush Messenger
http://www.hushmail.com/services-messenger?l=434
Promote security and make money with the Hushmail Affiliate Program:
http://www.hushmail.com/about-affiliate?l=427
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic