Full Disclosure mailing list archives
Re: Comparing Algorithms On The List OfHard-to-brut-force?
From: James Longstreet <jlongs2 () uic edu>
Date: Tue, 1 Nov 2005 13:04:16 -0600
On Nov 1, 2005, at 12:11 PM, Brandon Enright wrote:
IIRC, there aren't any good known attacks against Blowfish, AES, or Twofishso the *RIGHT* algorithm is whatever works best for your application.
Depending on the situation, there may be a feasible cache-timing attack on software implementations of AES: http://cr.yp.to/ antiforgery/cachetiming-20050414.pdf
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Comparing Algorithms On The List Of Hard-to-brut-force? Bipin Gautam (Nov 01)
- RE: Comparing Algorithms On The List OfHard-to-brut-force? Brandon Enright (Nov 01)
- Re: Comparing Algorithms On The List OfHard-to-brut-force? Andrew Farmer (Nov 01)
- Re: Comparing Algorithms On The List OfHard-to-brut-force? James Longstreet (Nov 01)
- Re: Comparing Algorithms On The List OfHard-to-brut-force? Bipin Gautam (Nov 01)
- RE: Comparing Algorithms On The List OfHard-to-brut-force? Aditya Deshmukh (Nov 01)
- RE: Comparing Algorithms On The List OfHard-to-brut-force? Brandon Enright (Nov 01)