- (Difficult) SHA-1 involves a lot of complicated steps, which I certainly didn't follow in detail. It seems like there's just about enough information in the book to implement it though. I had a hard time following the steps of DSA, but I think I was mostly able to understand why the equations for validating work they way they do. (Although I reckon they could convince that something worked that actually didn't).
- (Reflective) One thing I am confused about is why X_1 = h'(X_0, m_0), and then that applies more generally to j and j+1. In two different places (on pp. 25 and 26), it says messages are broken into blocks m_1 through m_L. It seems the message should either be broken into pieces m_0 to m_L-1, or the equation should be X_1 = h'(X_0, m_1). I emailed Dr. Washington about my perceived inconsistency. Still a great book, though!
Monday, November 8, 2010
8.3 and 9.5, due on November 10
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment