1998-01-07 - Re: Is FEAL developed by NTT safe?

Header Data

From: Alan Olsen <alan@clueserver.org>
To: “Nobuki Nakatuji” <bd1011@hotmail.com>
Message Hash: b82cd648232f59edd878edd79d357e6c6683f08447c6fb14dc198954a6ff1d96
Message ID: <3.0.5.32.19980106215602.0098b670@clueserver.org>
Reply To: <19980107020417.23803.qmail@hotmail.com>
UTC Datetime: 1998-01-07 06:07:19 UTC
Raw Date: Wed, 7 Jan 1998 14:07:19 +0800

Raw message

From: Alan Olsen <alan@clueserver.org>
Date: Wed, 7 Jan 1998 14:07:19 +0800
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Is FEAL developed by NTT safe?
In-Reply-To: <19980107020417.23803.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980106215602.0098b670@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain



At 06:04 PM 1/6/98 PST, Nobuki Nakatuji wrote:
>
>>
>>In article <19980105070034.3946.qmail@hotmail.com> you write:
>>> Is FEAL developed by NTT safe? Where isn't safe if it is here because 
>it 
>>> isn't safe? 
>>
>>FEAL is dead; I wouldn't ever use it in any new product.
>>Use triple-DES instead.
>>
>What kind of method was FEAL decoded in? 

All of them.

If you take a look at _Applied Cryptography (2nd Edition)_, you will find a
number of different methods that have been used against FEAL.

It seems that whenever someone comes up with a new method of cryptanalysis,
they use it on FEAL first.  (Or at least it seems that way...)

There are much better solutions.  Unpatented ones as well...

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano@teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan@ctrl-alt-del.com|






Thread