[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Names of algorithms

At 3:19 PM -0800 4/1/97, Ron Rivest wrote:
>First, note that the elements are in the order in which they are used: first
>you hash the message, then format the result of the hash for the signature
>algorithm, then apply the public-key algorithm.  The second
>of these operations may be "no-op" for the identify transformation.

I assume by your description that the specification of the hash algorithm
implies what message padding algorithm you are using?

Bill Frantz       | I have taken a real job at | Periwinkle -- Consulting
(408)356-8506     | Electric Communities as a  | 16345 Englewood Ave.
frantz@netcom.com | capability security guru.  | Los Gatos, CA 95032, USA

Follow-Ups: References: