[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Comparing Algorithms On The List OfHard-to-brut-force?




On Nov 1, 2005, at 12:11 PM, Brandon Enright wrote:

IIRC, there aren't any good known attacks against Blowfish, AES, or Twofish
so the *RIGHT* algorithm is whatever works best for your application.

Depending on the situation, there may be a feasible cache-timing attack on software implementations of AES: http://cr.yp.to/ antiforgery/cachetiming-20050414.pdf


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/