Although I usually get a wide range of responses, is there any
practical advice an end-user should take away from the recent AES256
attacks as described
here:http://www.schneier.com/blog/archives/2009/07/another_new_aes.html?
Should I continue to use AES256 (double AES) or default to single AES
On Wed, 19 Aug 2009 15:28, kevhil...@gmail.com said:
the article interesting (not sure if I understood a lot of the blog
comments), is there any practical advice I should take away from it as
it relates to GnuPG?
Don't care about it. It is no threat to use AES 256 or AES 128. The
remarkable
The successful attacks were on reduced-round versions of the algorithm, not on
the current implementations. The article was mostly informative for crypto
geeks as a state-of-the-art. The practical advice for end-users would be to
stick with the defaults for now.
Joe
On Wednesday, August
On Aug 19, 2009, at 9:28 AM, Kevin Hilton wrote:
Although I usually get a wide range of responses, is there any
practical advice an end-user should take away from the recent AES256
attacks as described
here:http://www.schneier.com/blog/archives/2009/07/another_new_aes.html?
Should I continue to
Kevin Hilton wrote:
Although I usually get a wide range of responses, is there any
practical advice an end-user should take away from the recent AES256
attacks as described here?
To repeat my usual advice: Unless you know what you're doing and why,
stick with the defaults.
The AES256
Werner Koch schreef:
...snipped
I am sure others will start a new debate now what to do, but I consider
such a debate more or less academic.
Grin ;-)
--
Henk M. de Bruijn
Mozilla Thunderbird 2.0.0.22 (20090605) with