Early boot, activation, upgrades
Jonathan Herzog
jherzog at jonathanherzog.com
Wed Jul 11 01:25:56 EDT 2007
Now that I've looked through the code for LTC SHA-512, I'm pretty
sure that I can examine LTC SHA-256 in a day or two. Is there an
imminent deadline I should know about?
As for the 256-bit curve: yes, it will trigger unaudited code paths,
but that's because I haven't yet audited every function used by the
ECC package. ECC uses a lot of math, for example, and I haven't yet
looked at each mathematical function yet. However, I can say that the
256-bit curve defined in LTC matches the NIST recommendation, and
that the unaudited code paths triggered by that curve will be in the
underlying math functions, not LTC itself.
--
Jonathan Herzog
Cryptographic consulting
jherzog at jonathanherzog.com
www.jonathanherzog.com
On Jul 10, 2007, at 1:14 PM, Ivan Krstić wrote:
>
> Jon, do you think you would be able to audit the LTC SHA-256 code
> reasonably quickly, and do you have qualms about the NIST 256-bit
> ECC curve triggering unaudited code paths? I'm not familiar with
> that code.
>
> --
> Ivan Krstić <krstic at solarsail.hcs.harvard.edu> | http://radian.org
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.laptop.org/pipermail/devel/attachments/20070710/e95f899e/attachment.html>
More information about the Devel
mailing list