1995-10-27 - Re: symmetric key algorithms

Header Data

From: Adam Shostack <adam@lighthouse.homeport.org>
To: shgoh@ncb.gov.sg (Goh Seow Hiong)
Message Hash: 99de0c072630720cbcc67708dba492642b6ded9410bb6801b13946a5eded75d5
Message ID: <199510261450.KAA25716@homeport.org>
Reply To: <Pine.3.89.9510261019.A29735-0100000@gallery.ncb.gov.sg>
UTC Datetime: 1995-10-27 03:34:04 UTC
Raw Date: Fri, 27 Oct 1995 11:34:04 +0800

Raw message

From: Adam Shostack <adam@lighthouse.homeport.org>
Date: Fri, 27 Oct 1995 11:34:04 +0800
To: shgoh@ncb.gov.sg (Goh Seow Hiong)
Subject: Re: symmetric key algorithms
In-Reply-To: <Pine.3.89.9510261019.A29735-0100000@gallery.ncb.gov.sg>
Message-ID: <199510261450.KAA25716@homeport.org>
MIME-Version: 1.0
Content-Type: text



| Could anyone comment on the acceptability and reliability of the 
| SAFER algorithm, in comparison with other algorithms such as IDEA,
| Triple-DES, DES, RC4, ....  Has there been any comparison paper 
| written on the pros and cons of the different symmetric key algorithms?

	There was a weakness shown in SAFER K-64 by Lars Knudsen at
Crypto '95.  It involved a related key chosen plaintext attack, which
derived from SAFER's XOR'ing the data with the key too often.

	It would make me nervous about using SAFER, but I'm just an
amateur at the crypto stuff.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






Thread