> On Feb 12, 2016, at 3:52 PM, Short, Todd <[email protected]> wrote:
> 
> So, if it’s “mandatory”, then it should be in the default set of ciphers, not 
> necessarily the “HIGH” set.
> 
> I’m selecting “HIGH” because I want 128-bit+ ciphers, not a cipher that that 
> has subsequently found to be weaker than previously thought.

3DES was not found weaker than previously thought.  It is as-strong as it ever 
was,
with 168-bit keys that are subject to a meet-in-the-middle attack (at 2^56 
memory cost)
that brings the brute force effort to a way unrealistic 112-bit attack.

The issue with 3DES its performance (slower than AES especially AESNI) and the 
short
block size (8 bytes vs. 16).  It is a cipher that has stood the test of time 
quite
well.  If you don't want 3DES, set your cipherlist to 
'DEFAULT:!EXPORT:!LOW:!MEDIUM:!3DES'

-- 
        Viktor.

-- 
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to