On Sunday, November 8, 2015, Dimitry Sibiryakov <s...@ibphoenix.com> wrote:

> 08.11.2015 12:08, Vlad Khorsun wrote:
> .
>
>    Faster cryptoalgorithms are vulnerable to attack by known text. To make
> analysis
> harder, some random salt used to be appended in the beginning.
>
>

Really?  Can you give an example of a fast modern cipher that is
vulnerable?  RC4 is vulnerable to related key combined with known
text attacks, but that requires a remarkably stupid design to exploit.

The fastest credible algorithm I'm aware of is AES with the "new
instructions", which is not known to be vulnerable to known text attacks
unless you have a couple of billions of years n which to carry them out.

Or have I missed sonething?


-- 
Jim Starkey
------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to