I was mixing up with the attack against twofish with reduced rounds (I think
this is true of blowfish with reduced rounds as well )
-Original Message-
From: Evan Nemerson [mailto:[EMAIL PROTECTED]]
Sent: 22 May 2002 22:57
To: John Horton; [EMAIL PROTECTED]
Subject: Re: [PHP] Mcrypt
and its easier to crack it, but its faster than
other modes.
Tx,
Vinod.
On Wed, 22 May 2002 John Horton wrote :
why use AES? Blowfish can have a 448 bit key size! Also, why use
ebc mode
with all the problems which come with it?
JH
-Original Message-
From: Vinod Panicker [mailto
Hi,
I believe that twofish has been successfully broken, so use blowfish
instead. Typically, for encrypting files you will use an algorithm like
blowfish in cbc mode (as opposed to ebc mode) but I don't know if Mcrypt
supports this. Also, when creating the hash of the file, it is probably best
to
File hashing is used to take a hash of the clear text. In this way, you can
append the hash to the encrypted text. When decrypting, you remove this
hash, decrypt the rest of the file, hash this decrypted file and see if the
two hashes match up. If they don't then an incorrect key was used with
To: John Horton
Cc: [EMAIL PROTECTED]; Jimmy Lantz
Subject: Re: RE: RE: [PHP] Mcrypt: Blowfish or Twofish or no fish? part
3
And why not use AES, which is an industry standard and having
being proven as the best encryption algorithm in recent times?
http://csrc.nist.gov/encryption/aes/aesfact.html
calculate a hash of the pass the user enters and store that. When the user
enters a pass again to get the data, then hash this pass and see if it
matches the stored hash. If it does , then send the user the data.
create a table that stores username, and hashed passwords for
authentication.
HTH
Hi,
Also try www.uklinux.net
They have php and perl cgi (with a mysql or postgres backend)
-Original Message-
From: Salman Ahmed [mailto:[EMAIL PROTECTED]]
Sent: 16 May 2002 03:05
To: PHP List
Subject: [PHP] Plz dont hate me for this
Hi,
I am also PHP lover plz dont hate me for this
Hi!
Is there any way of decomposing an integer into it's constituent bytes so
that a new byte order can be created?
tia
JohnH
John Horton
Software Engineer
BITbyBIT International Limited
[EMAIL PROTECTED]
Tel: + 44 (0) 1865 865400
Fax: + 44 (0) 1865 865450
www.bitbybit.co.uk
Disclaimer
8 matches
Mail list logo