On Thu, 26 Aug 2010 23:52:31 +0200 Christoph Anton Mitterer
<cales...@scientia.net> wrote:
> On Thu, 2010-08-26 at 17:43 -0400, Perry E. Metzger wrote:
> > I presume you mean the cipher by Anderson, Biham and Knudsen.
> Yep .... was there another one of the same name?
> 
> 
> > I'm unaware of one, but I think it is a fairly bad move to use
> > algorithms other than standard ones. Unless you have very good
> > reason to use something eperimental, I would stick to AES.
>
> I plan to use them stacked ... so that shouldn't be a problem IMO.

Is your machine too speedy? There are other things you could do to
slow it down if that's important to you.

> Any why should it be just experimental,... wasn't it very well
> analysed during the AES selection process?

Yes, and it wasn't selected, was it? People spend a lot of time and
effort finding flaws in AES at this point, but very little on Serpent.

In any case, I know of no such tools, know of no reason why anyone
would build such a tool, and know of security advantage to running
serpent composed with AES on one's machine.

Unless your box is surrounded by armed guards at all times and
detached from a network, and is running only hardware that you
personally produced in your own foundry from your own designs, there
are simpler ways to get the contents of your hard drive than
cracking keys. AES-128 is far more than good enough for all normal
purposes.

-- 
Perry E. Metzger                pe...@piermont.com


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20100826182900.2919d...@seasnet-6-11.cis.upenn.edu

Reply via email to