On Sunday, November 8, 2015, Dimitry Sibiryakov <s...@ibphoenix.com> wrote:
> 08.11.2015 12:08, Vlad Khorsun wrote: > . > > Faster cryptoalgorithms are vulnerable to attack by known text. To make > analysis > harder, some random salt used to be appended in the beginning. > > Really? Can you give an example of a fast modern cipher that is vulnerable? RC4 is vulnerable to related key combined with known text attacks, but that requires a remarkably stupid design to exploit. The fastest credible algorithm I'm aware of is AES with the "new instructions", which is not known to be vulnerable to known text attacks unless you have a couple of billions of years n which to carry them out. Or have I missed sonething? -- Jim Starkey
------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel