On Fri, May 16, 2008 at 8:05 AM, Matthew Toseland
<[EMAIL PROTECTED]> wrote:
> On Friday 16 May 2008 00:52, Daniel Cheng wrote:
>> On Fri, May 16, 2008 at 1:13 AM, Matthew Toseland
>> <[EMAIL PROTECTED]> wrote:
>> > On Thursday 15 May 2008 17:01, Daniel Cheng wrote:
>> >> On Thu, May 15, 2008 at 10:30 PM, Matthew Toseland
>> >> <[EMAIL PROTECTED]> wrote:
>> >> > On Tuesday 13 May 2008 17:10, [EMAIL PROTECTED] wrote:
>> >> >> Author: j16sdiz
>> >> >> Date: 2008-05-13 16:10:32 +0000 (Tue, 13 May 2008)
>> >> >> New Revision: 19912
>> >> >>
>> >> >> Modified:
>> >> >>    trunk/freenet/src/freenet/crypt/ciphers/Rijndael.java
>> >> >> Log:
>> >> >> No Monte Carlo test for Rijndael
>> >> >
>> >> > Huh?
>> >>
>> >> The test output the monte carlo test result, it is supposed to be
> compared
>> >> with ecb_e_m.txt in the FIPS standard.
>> >>
>> >> Our implementation is the original Rijndael (not the one in FIPS
> standard),
>> >> the output does not match ecb_e_m.txt.
>> >
>> > Is that bad? Presumably changes during the standardisation process were to
>> > improve security?
>> >>
>>
>> Just like what NIST did to other cipher, this remain a mystery -- no
>> one outside NIST know why. This can be good or bad, depends on the
>> conspiracy level.
>>
>> FYI, NIST once fixed a DES vulnerability before anybody else suspect
>> there was a weakness.
>>
>> The standard AES is not compatible to our Rijndael implementation ....
>> I guess it's not worth breaking the backward compatibility in 0.7.1.
>
> It might be if it's more secure...?

Unless I'm mistaken, the difference between Rijndael and AES relates
to things like specified block sizes and not the core crypto:

http://en.wikipedia.org/wiki/Rijndael#Description_of_the_cipher

Evan Daniel
_______________________________________________
Devl mailing list
Devl@freenetproject.org
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to