From owner-freebsd-security Sun May 2 23:25:59 1999 Delivered-To: freebsd-security@freebsd.org Received: from alcanet.com.au (border.alcanet.com.au [203.62.196.10]) by hub.freebsd.org (Postfix) with ESMTP id A748014C9E for ; Sun, 2 May 1999 23:25:55 -0700 (PDT) (envelope-from peter.jeremy@auss2.alcatel.com.au) Received: by border.alcanet.com.au id <40332>; Mon, 3 May 1999 16:11:09 +1000 Date: Mon, 3 May 1999 16:25:45 +1000 From: Peter Jeremy Subject: Re: Blowfish/Twofish To: nick@shibumi.feralmonkey.org Cc: freebsd-security@FreeBSD.ORG Message-Id: <99May3.161109est.40332@border.alcanet.com.au> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org 0x1c wrote: >On a similar note, is there any restriction on one-way hashing algorithms? >I forget. AFAIK, there isn't. MD4, MD5, SHA-1 etc appear to be all be freely exportable. The export restrictions appear to be on crypto for `secrecy', whilst crypto for `authentication' is unrestricted. (This does suggest that some lessons in basic cryptography are needed around the US State Department). Note: IANAL and free legal advice is worth what you paid for it. Peter To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message