tag:blogger.com,1999:blog-17908317.post6067103846788202256..comments2024-03-28T03:15:14.875-07:00Comments on Unenumerated: Tamper evident numbersNick Szabohttp://www.blogger.com/profile/16820399856274245684noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-17908317.post-46174203558406401962007-09-21T18:18:00.000-07:002007-09-21T18:18:00.000-07:00The theory of cryptographic checksums (also known ...The theory of cryptographic checksums (also known as hash functions or message digests) is still in its infancy. While they are arguably the most important tool in the financial cryptographer's toolbox (precisely for the reasons highlighted by this article), we know surprisingly little about them.<BR/>Most of the presently used constructs are showing weaknesses and even the criteria by which to evaluate new designs are not as clear as in the case of block ciphers.<BR/><A HREF="http://www.csrc.nist.gov/pki/HashWorkshop/index.html" REL="nofollow">NIST launched an international initiative</A> to address the issue. Hopefully, this will generate more interest and more research in this very important (and very difficult) branch of cryptography.Daniel A. Nagyhttps://www.blogger.com/profile/03407102257008616258noreply@blogger.comtag:blogger.com,1999:blog-17908317.post-13829352195823955912007-09-18T11:03:00.000-07:002007-09-18T11:03:00.000-07:00That's an interesting article. One point of varia...That's an interesting article. One point of variance -- tallies were in use long before the Norman invasion, and probably date from very prehistoric times. For example, some notched bones from before 10,000 BC have been found that are probably tallies. Particuarly interesting for tallies, which may be of more recent invention than prehistoric times, is the splitting protocol (each side gets half of the tally stick split lengthwise).Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-17908317.post-73334147627062546642007-09-17T09:53:00.000-07:002007-09-17T09:53:00.000-07:00The story of the tallies also shows how low-techno...The story of the tallies also shows how low-technology tamper-evidence provides the basis for a payment system.<BR/><BR/>http://www.arraydev.com/commerce/jibc/9811-11.htmCayce Pollardhttps://www.blogger.com/profile/18441199457742532638noreply@blogger.com