[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Comparing Algorithms On The List OfHard-to-brut-force?
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] Comparing Algorithms On The List OfHard-to-brut-force?
- From: James Longstreet <jlongs2@xxxxxxx>
- Date: Tue, 1 Nov 2005 13:04:16 -0600
On Nov 1, 2005, at 12:11 PM, Brandon Enright wrote:
IIRC, there aren't any good known attacks against Blowfish, AES, or
Twofish
so the *RIGHT* algorithm is whatever works best for your application.
Depending on the situation, there may be a feasible cache-timing
attack on software implementations of AES: http://cr.yp.to/
antiforgery/cachetiming-20050414.pdf
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/