--
From: Nicolas Williams nicolas.willi...@sun.com
Sent: Tuesday, July 21, 2009 10:43 PM
Subject: Re: Fast MAC algorithms?
But that's not what I'm looking for here. I'm looking for the fastest
MACs, with extreme security considerations (e.g.,
On Jul 21, 2009, at 10:48 PM, Perry E. Metzger wrote:
d...@geer.org writes:
The pieces of the key, small numbers, tend to =93erode=94 over
time as
they gradually fall out of use. To make keys erode, or timeout,
Vanish
takes advantage of the structure of a peer-to-peer file system. Such
mhey...@gmail.com mhey...@gmail.com writes:
2) If you throw TCP processing in there, unless you are consistantly going to
have packets on the order of at least 1000 bytes, your crypto algorithm is
almost _irrelevant_.
[...]
for a Linux 2.2.14 kernel, remember, this was 10 years ago.
Could the
On Thu, Jul 23, 2009 at 1:34 AM, Peter Gutmannpgut...@cs.auckland.ac.nz wrote:
mhey...@gmail.com mhey...@gmail.com writes:
2) If you throw TCP processing in there, unless you are consistantly going to
have packets on the order of at least 1000 bytes, your crypto algorithm is
almost _irrelevant_.
On Thu, Jul 23, 2009 at 05:34:13PM +1200, Peter Gutmann wrote:
mhey...@gmail.com mhey...@gmail.com writes:
2) If you throw TCP processing in there, unless you are consistantly going to
have packets on the order of at least 1000 bytes, your crypto algorithm is
almost _irrelevant_.
[...]
for a
Note for Moderator. This is not crypto but TOE being the solution to
networking performance problems is a perception that is dangerous to
leave in the crypto community.
On Jul 23, 2009, at 11:45 PM, Nicolas Williams wrote:
On Thu, Jul 23, 2009 at 05:34:13PM +1200, Peter Gutmann wrote: