From: John Dlugosz I just noticed this in a book I'm reading. Section 4.3 in "Applied Cryptography, 2nd ed." by Bruce Schneier is on this exact subject. --John