What I don't understand here is why the process of selecting a standard 
algorithm for cryptographic primitives is so highly focused on speed. 

We have machines that are fast enough now that while speed isn't a non issue, 
it is no longer nearly as important as the process is giving it precedence for. 
 

Our biggest problem now is security,  not speed. I believe that it's a bit 
silly to aim for a minimum acceptable security achievable within the context of 
speed while experience shows that each new class of attacks is usually first 
seen against some limited form of the cipher or found to be effective only if 
the cipher is not carried out to a longer process.  

-------- Original message --------
From: John Kelsey <crypto....@gmail.com> 
Date: 09/30/2013  17:24  (GMT-08:00) 
To: "cryptography@metzdowd.com List" <cryptography@metzdowd.com> 
Subject: [Cryptography] Sha3 
 
If you want to understand what's going on wrt SHA3, you might want to look at 
the nist website, where we have all the slide presentations we have been giving 
over the last six months detailing our plans.  There is a lively discussion 
going on at the hash forum on the topic.  

This doesn't make as good a story as the new sha3 being some hell spawn cooked 
up in a basement at Fort Meade, but it does have the advantage that it has some 
connection to reality.

You might also want to look at what the Keccak designers said about what the 
capacities should be, to us (they put their slides up) and later to various 
crypto conferences.  

Or not.  

--John
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to