newbie question - hashing & key rotation
- From: "Jill" <a@xxxxx>
- Date: Tue, 1 Dec 2009 18:00:50 +0530
I am a programmer who occasionally uses cryptography stuff.
I read this recently in a design doc - "Use SHA-1 with rotating key
for hashing data securely"
This one line stumped quite a bit (probably because of my limited knowledge
cryptography) & googling did not help.
I have some idea about "rotating keys" -> but this is in the context of
symmetric encryption - I think changing keys used for the encryption is
"key rotation". But in the context of hashing, I don't understand why
keys are. Can anyone explain?
- Re: Whitepaper on Password Based Cryptography
... I thought you were correcting me on the use of Password ... The use of symmetric refers to the type of cryptography in the system. ... >> memorable) secret. ... >> Writing specifications for symmetric encryption and calling them ...
- Re: 3DES versus SHA-1
... cryptographic algorithms.. ... Subject: 3DES versus SHA-1 ... > So I'd say from your purpose you should use 3DES to ENCRYPT things (so ... > Cryptography by Menezes et al (which he has for free in PDF on his ...
- Re: Responding to Snowdens revelations
... IIUC the various revelations haven't pointed at weaknesses in most ... around cryptography, ... SHA-1 doesn't look that strong anymore. ...
- Re: Which hash should replace the SHA family?
... Survival rate of CS-hash algorithms is quite catastrophic. ... natural question is which one is next to be ... Right after breaks were reported in SHA-1, ... >cryptography. ...
- Re: Now that SHA-1 is cracked...
... Paul Adare had this to say: ... > enough about cryptography to understand the issues here. ... SHA-1 has ... I'd suggest that rather than reading the news you ...