[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070613054521.18992.qmail@science.horizon.com>
Date: 13 Jun 2007 01:45:21 -0400
From: linux@...izon.com
To: akpm@...ux-foundation.org, linux@...izon.com, mpm@...enic.com
Cc: bgilbert@...cmu.edu, linux-kernel@...r.kernel.org, tytso@....edu
Subject: Re: [PATCH] random: fix folding
> Folding is done to minimize the theoretical possibility of systematic
> weakness in the particular bits of the SHA1 hash output. The result of
> this bug is that 16 out of 80 bits are un-folded. Without a major new
> vulnerability being found in SHA1, this is harmless, but still worth
> fixing.
Actually, even WITH a major new vulnerability found in SHA1, it's
harmless. Sorry to put BUG in caps earlier; it actually doesn't warrant
the sort of adjective I used. The purpose of the folding is to ensure that
the feedback includes bits underivable from the output. Just outputting
the first 80 bits and feeding back all 160 would achieve that effect;
the folding is of pretty infinitesimal benefit.
Note that last five rounds have as major outputs e, d, c, b, and a,
in that order. Thus, the first words are the "most hashed" and
the ones most worth using as output... which happens naturally with
no folding.
The folding is a submicroscopic bit of additional mixing.
Frankly, the code size savings probably makes it worth deleting it.
(That would also give you more flexibility to select the output/feedback
ratio in whatever way you like.)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists