[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <576B0A1B-3A88-4F1A-9705-A2D122F68FC0@uic.edu>
Date: Tue Nov 1 19:04:36 2005
From: jlongs2 at uic.edu (James Longstreet)
Subject: Comparing Algorithms On The List
OfHard-to-brut-force?
On Nov 1, 2005, at 12:11 PM, Brandon Enright wrote:
> IIRC, there aren't any good known attacks against Blowfish, AES, or
> Twofish
> so the *RIGHT* algorithm is whatever works best for your application.
Depending on the situation, there may be a feasible cache-timing
attack on software implementations of AES: http://cr.yp.to/
antiforgery/cachetiming-20050414.pdf
Powered by blists - more mailing lists