On Sun, Sep 22, 2013 at 7:05 AM, Ed Stone <t...@synernet.com> wrote: > There was some criticism from various parties, including from public-key > cryptography pioneers Martin Hellman and Whitfield Diffie,[2] citing a > shortened key length and the mysterious "S-boxes" as evidence of improper > interference from the NSA. The suspicion was that the algorithm had been > covertly weakened by the intelligence agency so that they — but no-one else > — could easily read encrypted messages.[3] Alan Konheim (one of the > designers of DES) commented, "We sent the S-boxes off to Washington. They > came back and were all different."[4]
It's now known that the NSA selected S-boxes that hardened the algorithm against differential cryptanalysis. Furthermore, 3DES continues to remain a viable cipher. See: http://www.cosic.esat.kuleuven.be/publications/article-2335.pdf -- Tony Arcieri
_______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography