[prev in list] [next in list] [prev in thread] [next in thread] 

List:       linux-crypto
Subject:    Re: a question about ciphers
From:       Jerome Etienne <jme () off ! net>
Date:       2001-12-13 16:02:06
[Download RAW message or body]

On Thu, Dec 13, 2001 at 04:19:18PM +0100, Marc Mutz wrote:
> > > blowfish is fast and has quite a long track record. I'd use it if
> > > it wasn't for the 64bit blocksize. In fact, I do use it ;-)
> > > The blocksize isn't an issue if you enrypt only modest volumes of
> > > data under a single key (like you should!) Several hundred MB are
> > > OK. But don't go beyond 2 or 3 GB.
> >
> > what are the detail of the problem with blowfish beyond 2 or 3GB ?
> 
> Birthday attack. Equal ciphertexts are being generated. Actually, the 
> boundary is 32G, but it's best to stay away from it.

suppose you are the attacker and get data encrypted with a block cipher,
two or more cipher texts block are equal, which information did get 
from it ?
-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic