Gentoo Logo
Gentoo Spaceship

Note: Due to technical difficulties, the Archives are currently not up to date. GMANE provides an alternative service for most mailing lists.
c.f. bug 424647
List Archive: gentoo-security
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
To: gentoo-security@g.o
From: Eckard Brauer <e.brauer@...>
Subject: Re: Encryption Ciphers
Date: Fri, 7 Mar 2008 08:07:19 +0100

Am Donnerstag, 6. März 2008 schrieb Peter Meier:
> > I just wanted to jump in and say that I'm personally a fan of Serpent.  I
> > like to use something that's a little less popular, but still open.  It
> > is similar in strength (IMHO), but there will be more people trying to
> > break AES than Serpent.  For example, I've read the XSL attack that can
> > weaken AES is too complex when used on Serpent -- it would be more
> > expensive than a brute force attack.
> in my opinion quite a bad assumption. the more a crypto algorithm is
> open, the more people it test, the more it can be assumed that it is
> safe against current known attacks.

IMHO even worse: You will need not only enough people to have it tested (means 
more to try it out), but enough people to have it _analyzed_ independently 
(this one will constrain the set of possible persons a lot) _and_ made the 
results public (I fear this one is also a working limit on that set).

Not that I want to correct you in any way, but I think that's the essence of 
what you wanted to express - only to make things clear.

Kind regards!
gentoo-security@g.o mailing list

-- Gianpiero.Tavano
Encryption Ciphers
-- Florian Philipp
Re: Encryption Ciphers
-- Danny
Re: Encryption Ciphers
-- Peter Meier
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Previous by thread:
Re: Encryption Ciphers
Next by thread:
Previous by date:
Re: Encryption Ciphers
Next by date:

Updated Jun 17, 2009

Summary: Archive of the gentoo-security mailing list.

Donate to support our development efforts.

Copyright 2001-2013 Gentoo Foundation, Inc. Questions, Comments? Contact us.