lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3EA2FE16.8000403@algroup.co.uk>
From: ben at algroup.co.uk (Ben Laurie)
Subject: RE: Rijndael

Timmah wrote:

>>>>Yes, it was, Belgian or Indian, I think.  I didn't mention it becuse I
>>>>couldn't remember how to spell it ;)
>>>>
>>>>But since it's now the US's AES standard, who knows how strong it is...
>>>
>>>The designers are Belgian (Flemish).  Not to denigrate them or their work,
>>>I believe that it was not the strongest of the five AES finalists, and
>>>this was demonstrated during the last few months before selection.  You
>>>can interpret that however you want.
>>>
>>
>>There were other factors in the selection process, not just cryptographic
>>strength. And some weaknesses have been fixed later.
> 
> 
> I maintain that the AES selection committee didn't weight factors sanely.
> Overall security of algorithms in different modes of operation should have
> been a deal-breaking factor and it was instead sacrificed for speed and
> other considerations.  That is just a fact.

IIRC, a key criterion was key scheduling speed. Forgive me for being
suspicious, but that sounds to me like "we'd like brute force to be
efficient, please".

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ