On Sun, Sep 22, 2013 at 7:05 AM, Ed Stone <t...@synernet.com> wrote:

> There was some criticism from various parties, including from public-key
> cryptography pioneers Martin Hellman and Whitfield Diffie,[2] citing a
> shortened key length and the mysterious "S-boxes" as evidence of improper
> interference from the NSA. The suspicion was that the algorithm had been
> covertly weakened by the intelligence agency so that they — but no-one else
> — could easily read encrypted messages.[3] Alan Konheim (one of the
> designers of DES) commented, "We sent the S-boxes off to Washington. They
> came back and were all different."[4]


It's now known that the NSA selected S-boxes that hardened the algorithm
against differential cryptanalysis. Furthermore, 3DES continues to remain a
viable cipher.

See: http://www.cosic.esat.kuleuven.be/publications/article-2335.pdf

-- 
Tony Arcieri
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to