Document: draft-krovetz-umac-07.txt Reviewer: Joel M. Halpern [joel@stevecrocker.com] Review Date: Sunday 11/20/2005 4:13 PM CST Telechat Date: Thursday 12/01/2005 Summary: This individual contribution for informational RFC appears to be ready for publication. The text in section 5 raised a question. If this is intended to be read by folks who are not security experts, an explanation of what the algorithm is to be used for in lay terms would be helpful. The text says in section 5. Please note that UHASH has certain combinatoric properties making it suitable for Wegman-Carter message authentication. UHASH is not a cryptographic hash function and is not a suitable general replacement for functions like SHA-1. So there are clearly cases to use and not use this material. minor: I would suggest that the phrase in the introduction describing the absence of intellectual property claims should probably include "to date".