On Tue, Sep 3, 2013 at 10:07 AM, Pete Stephenson <p...@heypete.com> wrote:
> On Mon, Sep 2, 2013 at 8:28 PM, Nicholas Cole <nicholas.c...@gmail.com> wrote:
>> On Mon, Sep 2, 2013 at 5:04 AM, Henry Hertz Hobbit
>> <hhhob...@securemecca.net> wrote:
>>
>> [snip]
>>
>>>
>>>  Paradoxically, AES256 & AES192 had
>>> weaknesses that made them less safe than AES (AES-128) several
>>> years back.  May I humbly suggest TWOFISH or one of the
>>> CAMELLLIA ciphers as a first choice UNTIL you determine whether
>>> or not the fixes for AES-256 and AES-192 are retroactive?  DID
>>> THEY GET THEM FIXED?  I am just assuming they did but that means
>>> I HOPE the older implementation and the newer one can easily be
>>> discerned when you do the decipher.
>>
>>
>> [snip]
>>
>> I was curious about this. The wikipedia page mentions the "Related Key
>> Attack" on these cyphers, but is vague about whether they were ever
>> fixed.
>>
>> Does anyone know?
>>
>> And did fixes make it into the version used by Gnupg?
>
> Even more importantly, were they ever an issue with GnuPG in the first place?
>
> That is, does GnuPG generate related keys?
>
> I was always under the impression that GnuPG randomly generated
> session keys rather than creating related session keys; if true,
> wouldn't this mean that the related-key attack doesn't apply?

And if that were true, I presume that would mean that the "AES is
stronger than AES256" argument would also fall. Or have I
misunderstood?

N.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to