-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Pedro Izecksohn wrote: > Because I spoke this openly yesterday in the elevator of my university, I > decided to write it here, to register that I discovered it, even that I could > not prove it yet. > The current OO's encryption method is easy to break, if we consider that > the beginning of content.xml is always the same and blowfish has a 64-bit > block size. > What do you think about it?
I would need to look at how long the key can be in the algorithm, but, blowfish is still a secure algorithm, in that it hasn't been broken yet, even if you know what the encrypted text is. - -- Corruptisima republica plurimae leges. [The more corrupt a republic, the more laws.] Tacitus from Annals III, 116AD Blogs: http://jamesruminations.blogspot.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (MingW32) iD8DBQFCvV7IJ/zyYkX46joRAlV9AJ44APgKvllBLhJ7XCOzKsSIDz7HmACcD1n+ EYEe7DiqnLAzL3cN5+AfF3w= =N0Ah -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
