On Thu, 26 Aug 2010 23:52:31 +0200 Christoph Anton Mitterer <cales...@scientia.net> wrote: > On Thu, 2010-08-26 at 17:43 -0400, Perry E. Metzger wrote: > > I presume you mean the cipher by Anderson, Biham and Knudsen. > Yep .... was there another one of the same name? > > > > I'm unaware of one, but I think it is a fairly bad move to use > > algorithms other than standard ones. Unless you have very good > > reason to use something eperimental, I would stick to AES. > > I plan to use them stacked ... so that shouldn't be a problem IMO.
Is your machine too speedy? There are other things you could do to slow it down if that's important to you. > Any why should it be just experimental,... wasn't it very well > analysed during the AES selection process? Yes, and it wasn't selected, was it? People spend a lot of time and effort finding flaws in AES at this point, but very little on Serpent. In any case, I know of no such tools, know of no reason why anyone would build such a tool, and know of security advantage to running serpent composed with AES on one's machine. Unless your box is surrounded by armed guards at all times and detached from a network, and is running only hardware that you personally produced in your own foundry from your own designs, there are simpler ways to get the contents of your hard drive than cracking keys. AES-128 is far more than good enough for all normal purposes. -- Perry E. Metzger pe...@piermont.com -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20100826182900.2919d...@seasnet-6-11.cis.upenn.edu