The hash extension technique used to generate an ECGA may be used to increase the strength of one-way hash functions and/or decrease the number of bits in any situation where some external requirement limits the number of hash bits, and that limit is below what is (or may be in the future) considered secure against brute-force attacks. For example, to decrease the length of human entered security codes (and maintain the same security), and/or to increase the strength of a human entered security code (and maintain the length of the security code), the security code may be generated and/or authenticated using an extended hash method.

 
Web www.patentalert.com

< Use of multiple queues in coupling facility to provide zoning capability in a parallel sysplex environment

> Selective event registration

> Authentication device, authentication system, authentication method, program and recording medium

~ 00554