[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: user-to-user vs. host-to-host keying



>  Your analysis was limited to DES.  The specifications are
>algorithm-independent and NEED to support other algorithms
>such as RCx, IDEA, etc.  The need for user-to-user keying

Actually, the analysis that resulted in the 2^32 block limitation would
seem to apply to any block cipher with a 64-bit block, regardless of
key length.

2^32 blocks is a lot of data, the weakness is rather academic, and it's
so easy to rekey that I'm not going to lose any sleep over this one.

Phil


References: