I'd prefer AES-256/GCM always, because either you have a hash function with 
512 bits output and hence some tolerance for 256-bit keys
or for password derivation you have always something like scrypt/ argon/ 
PHC winner/ PBKDF2 and hence can chose arbitrary derived key lengths.
I'd see no reason to choose AES-128 over AES-256 (except for maybe speed 
but that's negligible with AES)

BR

JPM

Am Montag, 23. Februar 2015 17:41:13 UTC+1 schrieb Ilya Bizyaev:
>
> OK, the header now looks like this: 
> ---------------------------------------------------- 
> struct Entangle_Header { 
>         char salt[64]; 
>         ............. /*More if needed*/ 
>           /* ----- Format ----- */ 
>         uint16_t prog_version;       /* Header format version */ 
>         uint64_t file_size;   /* size of original file */ 
>           byte keys[32]; /* AES-256 key storage area */ 
>         ............. /*More data for GCM if needed*/ 
> } 
> ---------------------------------------------------- 
> And what about encrypting the header with AES-128/GCM and the very file 
> with AES-256/GCM? That seems to be quite secure for the file and simple for 
> the user (16 char key).

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to