On 7/16/13 11:15 AM, Matthew Green wrote:
http://www.isg.rhul.ac.uk/tls/RC4biases.pdf
Thanks for bringing this pre-print link to my attention!
In summary, don't use RC4. Don't use it carelessly with IVs. And don't use RC4.
RC4 is available in many libraries and platforms. For the
[2013-07-17, William Allen Simpson]
On 7/16/13 11:15 AM, Matthew Green wrote:
Consider using Salsa20 instead.
It would be helpful for folks to read the entire thread
before making off the wall comments.
Yes, folks have mentioned Salsa20. It doesn't seem as
amenable to PPP packets as I would
Hi Bill,
On 17/07/13 10:50 AM, William Allen Simpson wrote:
Yes, folks have mentioned Salsa20. It doesn't seem as
amenable to PPP packets as I would like.
I don't quite know what that means, but reading quickly:
http://tools.ietf.org/html/draft-simpson-ppp-arc4-00
it seems you are doing the
[0] I haven't found them for XSalsa as yet. Don't know about ChaCha.
They are both included in
http://bench.cr.yp.to/primitives-stream.html
with reference implementations and efficient implementaiton. The
supercop test framework (downloadable from eBACS) checks other
implementations
On Wed, Jul 17, 2013 at 7:42 AM, ianG i...@iang.org wrote:
On 17/07/13 10:50 AM, William Allen Simpson wrote:
Thing is, you don't just need an encryption algorithm, you also need IV,
MAC, Padding concepts. (I agree that using a stream cipher obviates any
messing Padding needs and the 'mode'
On 17 July 2013 08:50, William Allen Simpson
william.allen.simp...@gmail.com wrote:
In summary, don't use RC4. Don't use it carelessly with IVs. And don't
use RC4.
RC4 is available in many libraries and platforms. For the
immediate future, it is most easily and likely implemented.
We
On Wed, Jul 17, 2013 at 03:50:50AM -0400, William Allen Simpson wrote:
On 7/16/13 11:15 AM, Matthew Green wrote:
http://www.isg.rhul.ac.uk/tls/RC4biases.pdf
Thanks for bringing this pre-print link to my attention!
In summary, don't use RC4. Don't use it carelessly with IVs. And don't use
William Allen Simpson william.allen.simp...@gmail.com wrote:
We need something yesterday, not next year.
...
Yes, folks have mentioned Salsa20. ...
So, let's talk about what to choose for something fast and
modern to implement in the next decade We cannot
recommend a dozen EU
hello,
admittedly, i got a little bit hyped about Keccak, especially its versatility.
so i thought why not devise an authenitcation / key stretching / key
derivation / secure storage protocol that uses solely Keccak to achieve all of
its goals?
i put together a brief (5 page) document describing
Subject [cryptography] authentication protocol proposa
For authentication of what/whom, with what credentials, to what
target(s)? Ah, users with passwords to some node with a password
verifier.
On Wed, Jul 17, 2013 at 4:54 PM, Krisztián Pintér pinte...@gmail.com wrote:
hello,
some benefits:
On 7/17/13 4:29 AM, Tor Erling Bjørstad wrote:
Salsa20/12 or /20. Not because there's anything wrong with
the ChaCha variant, but because Salsa20 is good enough and
also better established. Note e.g. that Salsa20 is what's
used in NaCl [1] (released well after ChaCha was proposed).
Thank you
11 matches
Mail list logo