-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Aloha!
Jerry Leichter wrote: > On Sep 1, 2013, at 2:11 PM, Perry E. Metzger wrote: > >> On Sun, 1 Sep 2013 07:11:06 -0400 Jerry Leichter >> <leich...@lrw.com> wrote: >>> Meanwhile, just what evidence do we really have that AES is >>> secure? >> The fact that the USG likes using it, too. > We know they *say in public* that it's acceptable. But do we know > what they *actually use*? > >> That's also evidence for eliptic curve techniques btw. > Same problem. (Slightly tangential but on topic I hope) Am I the only surprised that the NSA designed block ciphers SIMON and SPECK is vulnerable to differential attacks? http://eprint.iacr.org/2013/543 If I understand the history correctly NSA supported the development of DES as well as SHA-0/SHA-1 and their contributions shows knowledge about differential attacks at least as far back as 1977. - -- Med vänlig hälsning, Yours Joachim Strömbergson - Alltid i harmonisk svängning. ======================================================================== -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAlIoTj4ACgkQZoPr8HT30QH91gCg4aRb6tf1d6a5mOnBrF0/GP6c NwIAnRuB99lNpz04/WG0trIQU9ZKnW9A =4r0M -----END PGP SIGNATURE----- _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography