[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

*To*: rivest@theory.lcs.mit.edu (Ron Rivest), spki@c2.net*Subject*: Re: Names of algorithms*From*: Bill Frantz <frantz@netcom.com>*Date*: Tue, 1 Apr 1997 22:59:15 -0800*Cc*: blampson@microsoft.com, burt@rsa.com*In-Reply-To*: <199704012319.AA23739@swan.lcs.mit.edu>*Sender*: owner-spki@c2.net

At 3:19 PM -0800 4/1/97, Ron Rivest wrote: >First, note that the elements are in the order in which they are used: first >you hash the message, then format the result of the hash for the signature >algorithm, then apply the public-key algorithm. The second >of these operations may be "no-op" for the identify transformation. I assume by your description that the specification of the hash algorithm implies what message padding algorithm you are using? ------------------------------------------------------------------------- Bill Frantz | I have taken a real job at | Periwinkle -- Consulting (408)356-8506 | Electric Communities as a | 16345 Englewood Ave. frantz@netcom.com | capability security guru. | Los Gatos, CA 95032, USA

**Re: Names of algorithms***From*: Carl Ellison <cme@cybercash.com>

**Names of algorithms***From*: rivest@theory.lcs.mit.edu (Ron Rivest)

- Prev by Date:
**Re: single <auth> per cert (was Re: "auth" --> "tag" ?? )** - Next by Date:
**Re: Auth** - Prev by thread:
**Re: Names of algorithms** - Next by thread:
**Re: Names of algorithms** - Index(es):