_____ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kerry Bonin Sent: Wednesday, November 22, 2006 10:20 PM To: theory and practice of decentralized computer networks Subject: Re: [p2p-hackers] Re: security and protocols This is most commonly done by using a CTR mode stream cipher .. Block cipher. I assume it's a typo, since you said you were using TwoFish. Using CTR instead of any other chaining mode (excluding ECB) has exactly one benefit - the counter field can be reused for replay protection. Otherwise it would require a separate packet sequence number field. But if I remember correctly from the discussion on a cryptography maillist, CTR chaining introduces some undesired/unresearched crypto properties and therefore the consensus was that 4 byte savings over traditional CBC mode were simply not worth taking a risk of using CTR.
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
