On Fri, Oct 11, 2013 at 12:23 AM, James A. Donald <[email protected]>wrote:

>
> There is a smoking gun on one of random number generators.
>
> There is strong circumstantial evidence, reason for suspicion, on
> suggested Suite B.
>
> AES and SHA look to be fine, but using them gives the appearance to end
> users that you might be playing footsie with NIST. Cryptographer Jon Callas
> has therefore made Twofish and Skein the default for silent circle.
>
> I recommend that everyone follow Jon Callas on symmetric cryptography, and
> DJ Bernstein on asymmetric cryptography.  The best people are putting as
> much distance as possible between themselves and NIST.
>
> Oh, and about tinfoil hats:
>
> There really is a great big government conspiracy, and they really are out
> to get you.  Tinfoil hats may not be effectual, but Bernstein's curve25519
> will help.
>
>
> ______________________________**_________________
> List mailing list
> [email protected]
> http://lists.pfsense.org/**mailman/listinfo/list<http://lists.pfsense.org/mailman/listinfo/list>



To play devil's advocate, I'd say using AES and SHA gives the appearance to
end users that it's business as usual in enterprise-town. Right now most
people are still going to be using some flavor of AES and some flavor of
SHA.  And it has nothing to do with some intentional close relationship
with NIST.  It's just that big gears turn slowly.  On the practical side of
things, interoperability is a big deal for a lot of people.  And a wider
array of ciphers will certainly be coming down the pipeline soon, but for
now if I want to connect to John Q. Client, I'm at the mercy of what their
systems support in terms of transform sets.
_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to