_____  

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kerry Bonin
Sent: Wednesday, November 22, 2006 10:20 PM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Re: security and protocols

 
 This is most commonly done by using a CTR mode stream cipher  ..    

Block cipher. I assume it's a typo, since you said you were using TwoFish.
 
Using CTR instead of any other chaining mode (excluding ECB) has exactly one
benefit - the counter field can be reused for replay protection. Otherwise
it would require a separate packet sequence number field. But if I remember
correctly from the discussion on a cryptography maillist, CTR chaining
introduces some undesired/unresearched crypto properties and therefore the
consensus was that 4 byte savings over traditional CBC mode were simply not
worth taking a risk of using CTR.
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to