Monday, November 8, 2010

8.3 and 9.5, due on November 10

  1. (Difficult) SHA-1 involves a lot of complicated steps, which I certainly didn't follow in detail.  It seems like there's just about enough information in the book to implement it though.  I had a hard time following the steps of DSA, but I think I was mostly able to understand why the equations for validating work they way they do.  (Although I reckon they could convince that something worked that actually didn't).
  2. (Reflective) One thing I am confused about is why X_1 = h'(X_0, m_0), and then that applies more generally to j and j+1.  In two different places (on pp. 25 and 26), it says messages are broken into blocks m_1 through m_L.  It seems the message should either be broken into pieces m_0 to m_L-1, or the equation should be X_1 = h'(X_0, m_1).  I emailed Dr. Washington about my perceived inconsistency.  Still a great book, though!

No comments:

Post a Comment