On 14/10/10 3:56 PM, Zooko O'Whielacronx wrote:

In any case, I'm pretty sure that as a *user* of hash functions what I
care about is "more likely to fail" (and efficiency), not about "bits
of security" for any bit-level greater than about 128 (including
consideration of quantum attacks, multi-target attacks, etc.)


Yes.  This was something I was trying to get at with Pareto-secure:

http://iang.org/papers/pareto-secure.html

There is a point beyond which all efforts are theoretical, and deliver zero practical benefit. We could probably argue this is at 128 bits.

Beyond that, we're likely doing ourselves damage, because we're distracting from the true issues. By far the majority (99.99%) of problems lie outside the issues of strong cryptographic algorithms. If we spend time on them, to the distraction of our clear and present dangers, we're now practicing cryptographic numerology.

http://financialcryptography.com/mt/archives/001286.html

It's fun, it looks great to the media, it impresses the masses. As Peter says, it's a fashion statement.

But security, it ain't.

iang

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to