[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gnupg-users
Subject:    Re: weakness in sha 1
From:       <vedaal () hush ! com>
Date:       2004-09-26 6:14:58
Message-ID: 200409260614.i8Q6EwEt015651 () mailserver2 ! hushmail ! com
[Download RAW message or body]

Atom 'Smasher' atom at suspicious.org, 
on Sun Sep 26 07:11:54 CEST 2004, wrote:

> if dh/dsa can be modified to accept greater than 160 size and use sha

> 256, great, if not, then it might be prudent to look into a new hash

> design that would be non md5/non sha-1 based that would still allow

> dh/dsa signing at the 160 level
==============

] how about RIPEMD-160?

]100% compatible with DSS (DSA), already part of GnuPG and it's neither
]SHA 
]nor MD5 based.

but is ripemd based, ;-)
for which a weakness is already demonstrated
see
http://eprint.iacr.org/2004/199.pdf

] even without a weakness in any flavors of SHA i'd like to see DSA 
] (the scalable algorithm) formally adopted into larger varieties of
  
] DSS (the current standard) to allow larger hashes and larger keys.
i 
] guess if]/when that happens DSS will become DSS-0 and larger 
] variants will become DSS-1, 

agree 100%

vedaal



Concerned about your privacy? Follow this link to get
secure FREE email: http://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
http://www.hushmail.com/services-messenger?l=434

Promote security and make money with the Hushmail Affiliate Program: 
http://www.hushmail.com/about-affiliate?l=427

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic