Back to Results
First PageMeta Content
Public-key cryptography / Internet standards / Secure communication / Transport Layer Security / Cipher suite / SHA-2 / Collision attack / SHA-1 / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols


Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University Abstract
Add to Reading List

Document Date: 2006-02-09 00:36:39


Open Document

File Size: 100,71 KB

Share Result on Facebook

City

Cambridge / /

Company

Wilson / /

Country

United States / /

/

Facility

Columbia University / FIPS PUB / National Institute of Standards and Technology / /

IndustryTerm

symmetric encryption algorithm / channel security protocol / strongest algorithm / given protocol / realworld protocols / allowed digest algorithms / store-and-forward protocol / stronger algorithm / typical public key-based systems / typical protocol / negotiatiable algorithm / version/algorithm / cryptographic algorithms / typical application software / hash algorithms / security protocols / authentication protocol / cleanest solution / given security protocol / broken algorithm / stronger hash algorithms / hash algorithm / Internet security protocols / cryptographic protocols / store-and-forward protocols / weaker algorithm / digest algorithms / weaker algorithms / signature algorithms / application protocols / Internet Mail Extensions / Web security / digest algorithm / signature algorithm / /

OperatingSystem

Unix / /

Organization

Columbia University / U.S. Department of Commerce / US government / National Institute of Standards and Technology / Internet Engineering Task Force / US Federal Reserve / American Forces Information Service / Department of Defense / /

Person

Charlie Kaufman / Shamir / Steven M. Bellovin / Russ Housley / Peter Gutmann / John Kelsey / Steve Burnett / Jin Goh / Ben Laurie / Blake Ramsdell / Eric K. Rescorla / Steve Henson / Alex Alten / Hal Finney / /

Position

major Internet security protocols / interpreter / /

ProgrammingLanguage

JavaScript / HTML / Postscript / /

PublishedMedium

the GOST digest / Lecture Notes in Computer Science / /

Technology

store-and-forward protocol / S/N / broken algorithm / signature algorithm / session-oriented protocols / security protocols / HTML / negotiatiable algorithm / RSA signature algorithm / digest algorithm / Message-Digest Algorithm / realworld protocols / encryption / possible Even protocols / PRF algorithm / cryptography / compromised algorithm / typical protocol / stronger hash algorithms / hash algorithms / message encryption / given protocol / Session Initiation Protocol / MAC algorithm / Digital Signature / same algorithm / given security protocol / cryptographic algorithms / weaker algorithm / S/MIME / corresponding algorithm / authentication protocol / symmetric encryption algorithm / cryptographic algorithms Any protocol / Public Key Infrastructure / strongest algorithm / hash algorithm / session-oriented protocol / private key / affected algorithm / Secure Shell / SSL / stronger algorithm / digest algorithms / channel security protocol / application protocols / allowed digest algorithms / public key / two cryptographic algorithms / MD4 Message Digest Algorithm / key exchange algorithms / HTTP / caching / Mail Transfer Protocol / store-and-forward protocols / certificate-based protocols / signature algorithms / Internet security protocols / using the strongest algorithm / /

URL

http /

SocialTag