Niels Provos <[EMAIL PROTECTED]> writes:

> In message <[EMAIL PROTECTED]>, Charles M. Hannum writes:
> >significantly weaker than `outer feedback' mode.  (I may have
> >Schneier's terminology switched there.  The point being that SSH codes
> >3DES as effectively 3 independent passes through 1DES.)
> Could you back up the 'significantly weaker' with attack complexities?

I don't recall the details offhand, but it *is* documented in Applied
Crypto...

Reply via email to