TFM needed ro R
David Rudder <drig@magicweb.com> Fri, 13 September 1996 21:08 UTC
Received: from cnri by ietf.org id aa07452; 13 Sep 96 17:08 EDT
Received: from neptune.hq.tis.com by CNRI.Reston.VA.US id aa14196; 13 Sep 96 17:08 EDT
Received: from neptune.tis.com by neptune.TIS.COM id aa15022; 13 Sep 96 16:34 EDT
Received: from relay.hq.tis.com by neptune.TIS.COM id aa15007; 13 Sep 96 16:28 EDT
Received: by relay.hq.tis.com; id QAA01716; Fri, 13 Sep 1996 16:32:09 -0400
Received: from sol.hq.tis.com(10.33.1.100) by relay.tis.com via smap (V3.1.1) id xma001682; Fri, 13 Sep 96 16:31:39 -0400
Received: from relay.hq.tis.com by tis.com (4.1/SUN-5.64) id AA03423; Fri, 13 Sep 96 16:30:47 EDT
Received: by relay.hq.tis.com; id QAA01673; Fri, 13 Sep 1996 16:31:34 -0400
Received: from ws5.magicweb.com(207.88.92.102) by relay.tis.com via smap (V3.1.1) id xma001637; Fri, 13 Sep 96 16:31:02 -0400
Received: (from drig@localhost) by drig.magicweb.com (8.6.12/8.6.9) id NAA10149; Fri, 13 Sep 1996 13:32:40 -0700
Date: Fri, 13 Sep 1996 13:32:36 -0700
From: David Rudder <drig@magicweb.com>
To: pem-dev@tis.com
Subject: TFM needed ro R
Message-Id: <Pine.LNX.3.91.960913132352.10128B-100000@drig.magicweb.com>
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Sender: pem-dev-approval@neptune.tis.com
Precedence: bulk
Hello, I'm trying to write a MD2 program. Applied Cryptography by Bruce Schneier says "Append a 16-byte checksum to the message". Um, dumb question - How do I make a checksum? Is this the CRC? Is CRC the only checksum? In any case, does anyone know of an RFC or something like that that says how to go about making a checksum? Applied Cryptography doesn't have anything on it (at least, not according to the index and I can't remember reading anything). I've searched the Web and found examples in Pascal, C and Forth, but I'd like to understand the big picture before writing a new one (I need to do it in Java). The RFC index has two entries with "checksum" in the title, but these seem to be IP specific. On a more conversational note: RIPEM and SSLeay seem to like MD5. RIPEM uses MD2 for it's X.509 certificates but MD5 for it's MIC-Info. There are a bunch of MD5 programs out there and a number written in Java. Bruce Schneier says "I am wary of MD5" on pge 441 of Applied Cryptography. He states before that that MD5 hasn't been provven insecure, but weaknesses have been found in the compression function. If he is wary of this algorithm, then why is it so popular? It's by far more prevelant than any other message digest I've seen. -Dave drig@magicweb.com I got a coffee mug from Cray Research when they moved out. Now I can drink my coffee while doing 63 other, unrelated tasks.
- TFM needed ro R David Rudder
- Re: TFM needed ro R Ned Freed
- Re: TFM needed ro R David Rudder
- Re: TFM needed ro R Ned Freed