Perry E. Metzger (perry@piermont.com)
Tue, 30 Jun 1998 09:25:19 -0400
Alex Alten writes:
> >I'm actually under the impression that using a truncated hash output
> >in lieu of the hash produces a more secure result under many
> >circumstances.
>
> No. Hashes do not have perfect random output. If you truncate the output
> you will introduce vulnerabilities not anticipated by the designer.
I don't mean to be insulting here, really I don't, but quite frankly
you don't have any idea in hell what you are talking about. Even your
"explanation" here doesn't have any ring of reasonableness to it. Read
some of the literature on using hashes in message authentication codes
first, THEN talk.
As I noted, if you aren't in a situation where birthday attacks are an
issue, some truncation can reduce vulnerability to attacks to
determine the key of the MAC.
Before replying, please learn what I'm talking about FIRST.
Perry
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:19:15 ADT