weakness in sha 1
vedaal at hush.com
vedaal at hush.com
Sun Sep 26 08:14:58 CEST 2004
Atom 'Smasher' atom at suspicious.org,
on Sun Sep 26 07:11:54 CEST 2004, wrote:
> if dh/dsa can be modified to accept greater than 160 size and use sha
> 256, great, if not, then it might be prudent to look into a new hash
> design that would be non md5/non sha-1 based that would still allow
> dh/dsa signing at the 160 level
==============
] how about RIPEMD-160?
]100% compatible with DSS (DSA), already part of GnuPG and it's neither
]SHA
]nor MD5 based.
but is ripemd based, ;-)
for which a weakness is already demonstrated
see
http://eprint.iacr.org/2004/199.pdf
] even without a weakness in any flavors of SHA i'd like to see DSA
] (the scalable algorithm) formally adopted into larger varieties of
] DSS (the current standard) to allow larger hashes and larger keys.
i
] guess if]/when that happens DSS will become DSS-0 and larger
] variants will become DSS-1,
agree 100%
vedaal
Concerned about your privacy? Follow this link to get
secure FREE email: http://www.hushmail.com/?l=2
Free, ultra-private instant messaging with Hush Messenger
http://www.hushmail.com/services-messenger?l=434
Promote security and make money with the Hushmail Affiliate Program:
http://www.hushmail.com/about-affiliate?l=427
More information about the Gnupg-users
mailing list