JEP 287: SHA-3 Hash Algorithms
ecki at zusammenkunft.net
ecki at zusammenkunft.net
Fri Apr 22 08:15:49 UTC 2016
Hello Valerie,
Yes that is what I was trying to say. :) However I dont know if this is clear to everybody else.
It confused me, since most of the example testcases in the linked standard are BIT aligned, only the Validation subproject mentions the possibility of a byte mode. But I guess if the distinction is normal it does not need to be documented. On the other hand, it does not hurt to add it to the non-goals.
Gruss
Bernd
--
http://bernd.eckenfels.net
-----Original Message-----
From: Valerie Peng <valerie.peng at oracle.com>
To: security-dev at openjdk.java.net
Sent: Fr., 22 Apr. 2016 2:40
Subject: Re: JEP 287: SHA-3 Hash Algorithms
Existing security/crypto APIs in JDK are all BYTE constrained. So, the
implementation will be "BYTE-only".
Are you suggesting to explicitly mention in the SHA-3 JEP that these
algorithm impl will be "BYTE-only"?
Valerie
On 4/21/2016 1:40 AM, ecki at zusammenkunft.net wrote:
> Hello,
>
> Just noticed, the validation program allows BIT- or BYTE-only APIs, the existing ones are all BYTE constrained. That would be a good definition in the JEP:
>
> http://csrc.nist.gov/groups/STM/cavp/documents/sha3/sha3val.html
>
> Gruss
> Bernd
More information about the security-dev
mailing list