Full Disclosure mailing list archives

Re: Comparing Algorithms On The List OfHard-to-brut-force?


From: James Longstreet <jlongs2 () uic edu>
Date: Tue, 1 Nov 2005 13:04:16 -0600


On Nov 1, 2005, at 12:11 PM, Brandon Enright wrote:

IIRC, there aren't any good known attacks against Blowfish, AES, or Twofish
so the *RIGHT* algorithm is whatever works best for your application.

Depending on the situation, there may be a feasible cache-timing attack on software implementations of AES: http://cr.yp.to/ antiforgery/cachetiming-20050414.pdf

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: