[openssl-users] openSSL and SLOTH attack
Michael Sierchio
kudzu at tenebras.com
Fri Jan 8 19:00:46 UTC 2016
2^48. Which is larger than 248, which was a cut-and-paste error. ;-)
On Fri, Jan 8, 2016 at 11:00 AM, Michael Sierchio <kudzu at tenebras.com>
wrote:
> "Since the HMAC is only 96 bits long, even a generic collision requires
> only about 248 HMAC computations"
>
> But a sequence/call-flow diagram is on the page Sandeep referenced:
> http://www.mitls.org/pages/attacks/SLOTH
>
> - M
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160108/978a1924/attachment.html>
More information about the openssl-users
mailing list