Security Basics mailing list archives
RE: encryption comparison chart
From: "ken kousky" <kkousky () ip3inc com>
Date: Fri, 12 Jan 2007 13:04:00 -0500
The block mode matters as much or more than your choice of the base algorithm. Any one of these is extremely weak if deployed in ECB mode even with 256 bit keys. There's little to say for deployment decisions without consideration of you mode and second, your key management practices. Check out the Wiki penguin example if you have any questions about cipher block modes of operation - it says it all. KWK -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Eric McMillen Sent: Thursday, January 11, 2007 5:56 PM To: s3cur1tyl1st () yahoo com Cc: security-basics () securityfocus com Subject: Re: encryption comparison chart -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 AES or Blowfish, more important ensure that you choose a good strong key. Eric McMillen, CISSP, CISM, CISA The McMillen Group, LLC http://www.mcmillengroup.com On Jan 11, 2007, at 8:21 AM, s3cur1tyl1st () yahoo com wrote:
Does anyone have a good comparison chart of encryption algorithms? I am using true crypt and want to know what the strongest encryption is. Here are the encryption options trucrypt offers. AES Blowfish CAST5 Serpent Triple DES Twofish AES-TwoFish Any help would be great. Thanks ---------------------------------------------------------------------- ----- This list is sponsored by: ByteCrusher Detect Malicious Web Content and Exploits in Real-Time. Anti-Virus engines can't detect unknown or new threats. LinkScanner can. Web surfing just became a whole lot safer. http://www.explabs.com/staging/promotions/xern_lspro.asp? loc=sfmaildetect ---------------------------------------------------------------------- -----
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.2 (Build 4075) wsBVAwUBRabAc8+eMJe7UchjAQjxgAgAlw213yKquBTsUYRn+muP6X2psbYgFzUe 5MWLnc+hDXEZz46tHgcTDmt2AlYms3+o3FczyslFS5de4+19xDuFf/L7SK3mrP39 7vjExjLzjPshtF+z8CdVBB8ZaBblocF1EDAHweKfBad6sh9qe8uu9arYCHhloxrC btg025VECQpf7WZBVOfYn3ujULdOVBykpRO11aScZNKAu4Oo8DpFTdpjtPyvO2SF D2FOx3SPYQtQFD0ctn7NsWdnR5BnXTO3x0wb5WRYrNFeKx2JOACqigE4JVTfXgLK XTW6GwkuWJ6Un3D3ntHdNbwhEy8UV1m8zVZEMmvaL28bBgT5ja2MIw== =zvL2 -----END PGP SIGNATURE----- --------------------------------------------------------------------------- This list is sponsored by: ByteCrusher Detect Malicious Web Content and Exploits in Real-Time. Anti-Virus engines can't detect unknown or new threats. LinkScanner can. Web surfing just became a whole lot safer. http://www.explabs.com/staging/promotions/xern_lspro.asp?loc=sfmaildetect --------------------------------------------------------------------------- --------------------------------------------------------------------------- This list is sponsored by: ByteCrusher Detect Malicious Web Content and Exploits in Real-Time. Anti-Virus engines can't detect unknown or new threats. LinkScanner can. Web surfing just became a whole lot safer. http://www.explabs.com/staging/promotions/xern_lspro.asp?loc=sfmaildetect ---------------------------------------------------------------------------
Current thread:
- encryption comparison chart s3cur1tyl1st (Jan 11)
- Re: encryption comparison chart Eric McMillen (Jan 12)
- RE: encryption comparison chart ken kousky (Jan 15)
- Re: encryption comparison chart Eric McMillen (Jan 12)