From: David B. <db...@du...> - 2002-03-21 20:46:22
|
cool, Kyle also suggested a few things like: we reccomend nothing. w= hich i thought was a good policy to take. At anyrate, i'll change a few things, and post it again for comments. And i guess my own bias about DES(i don't like it one bit ;-) shouldn= 't really be put in the briefs anyway. hvr, can you give us a clue as to what/when this patch you want us to= wait for is coming/is about ? Dave On Thu, 21 Mar 2002, Gisle S{lensminde wrote: > On Wed, 20 Mar 2002, David Bryson wrote: > > > I spent the last day or so collecting information on all of the c= iphers so > > that we could put some documentation in the "help" section of the= configs. > > Attached is my preliminary draft. Please look over it, find spel= ling > > errors, comment on it, change things. I'll try to get the digest= s done > > fairly soon as well. > > Dave > > > > Nice work. Here are some comments on the text: > > About AES/Rijndael: > > "It supports key sizes of 128, 192, and 256 bits which executes 9, = 11, and > 13 rounds respectively." > > This is slightly wrong. The rijndael specification specifies 10, 12= and 14 > rounds, 9, 11, and 13 ordinary round, and then one special last rou= nd. > This special last rounds are counted in the specification of the ci= pher, > so I think that it should be corrected. > > MARS/RC6: > > The IBM has patented MARS, but gives it for a royalies free license= , > even if it didn't won the AES competition, unlike RC6, where RSA s= ecurity > that only would give up their patent rights if they won. (Which was= a > reqirement for the candidates anyway). So you should also mention i= t for > RC6 > > http://www.tivoli.com/news/press/pressreleases/en/2000/mars.html > > Serpent > > "Serpent was submitted as an AES candidate cipher coming in second = place." > > This is not quite true, given that NIST only specified a winner, an= d > didn't rank the other 5 finalists. But the participants of the > 3rd AES conference ranked it as no 2, and it's belived that > it would won, if rijndael had been found unsuited for some reason. > But NIST did not state this. > > DES: > > "This cipher was the first ever block cipher designed by Horst Fie= stel > which became DES(aka Lucifer)." > > Lucifer is the predecessor(s) of DES, rather than the same thing. T= he > candidate IBM gave to the NBS (predecessor of NIST), was modified b= y NSA > by changing the key schedule, and the sboxes. There was a lot of > speculation of why they did so, but after diffencial cyptanalysis w= as > discovered by the sivil cryptographic community around 1990, it see= med > clear that the changes was to make the cipher resistent against > differential cryptanalysis, and to reflect the effective keylength = in the > real keylength. I would rather write: > > "This cipher was designed by IBM and NSA based on the Lucifer ciphe= r > desigend by IBM" > > "It should be noted that DES is a older, slower, and insecure > algorithm. We suggest you use one of the newer more secure ciphers > with a larger key size." > > I would rather say something like: > > "It should be noted that DES has a keylength of only 56 bits, which > is insufficient to provide real security today. We suggest you use = one of > the newer more secure ciphers ith a larger key size." > > 3DES: > > "This cipher is a modification of the DES algorithm which increases= the > keysize to 112-bits." > > It increases the keylength to 168 bits, but the best known > attack has a complexity of 112 bits. If you change "keysize" > "effective keysize" it will be more precise. > > "3DES is 3x slower than DES and provides minimal increase in securi= ty." > > 3DES provides _much_ more security than DES. 3DES can't be broken > today not even by NSA, unless they have some SCI-FI device in their > basement. DES can be broken even by organizations with a limited > budget, or groups of individuals on the net. In fact 3DES is rated > as the most trustworthy cipher by many cryptographers, because > it can rely on the security of DES, where most efficent attack > is a brute force attack. The best known attack on 3DES is a meat in > the middle attack with a work factor of 2^112 and a memory usage of > 2^64. This is a comfortable margin to the minimum keylength even fo= r > longtime high security (which is 90 bits AFAIK). It better to just = say > it's slow. > > > > -- > Gisle S=E6lensminde ( gi...@ii... ) > > With sufficient thrust, pigs fly just fine. However, this is not > necessarily a good idea. It is hard to be sure where they are going > to land, and it could be dangerous sitting under them as they fly > overhead. (from RFC 1925) > > > _______________________________________________ > CryptoAPI-devel mailing list > Cry...@li... > https://lists.sourceforge.net/lists/listinfo/cryptoapi-devel > |