[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: user-to-user vs. host-to-host keying
> Your analysis was limited to DES. The specifications are
>algorithm-independent and NEED to support other algorithms
>such as RCx, IDEA, etc. The need for user-to-user keying
Actually, the analysis that resulted in the 2^32 block limitation would
seem to apply to any block cipher with a 64-bit block, regardless of
key length.
2^32 blocks is a lot of data, the weakness is rather academic, and it's
so easy to rekey that I'm not going to lose any sleep over this one.
Phil
References: