1996-01-22 - Re: Why is blowfish so slow? Other fast algorithms?

Header Data

From: “James A. Donald” <jamesd@echeque.com>
To: David Mazieres <cypherpunks@toad.com
Message Hash: 1b063305cccf9c2b1ecea2b3dd667e3edf4bb1d7a0713cf3f2b521e0766a80ed
Message ID: <199601221601.IAA14610@mailx.best.com>
Reply To: N/A
UTC Datetime: 1996-01-22 15:59:09 UTC
Raw Date: Mon, 22 Jan 96 07:59:09 PST

Raw message

From: "James A. Donald" <jamesd@echeque.com>
Date: Mon, 22 Jan 96 07:59:09 PST
To: David Mazieres <cypherpunks@toad.com
Subject: Re: Why is blowfish so slow?  Other fast algorithms?
Message-ID: <199601221601.IAA14610@mailx.best.com>
MIME-Version: 1.0
Content-Type: text/plain


At 02:00 AM 1/22/96 -0500, David Mazieres wrote:
>Failing that, can anyone suggest other secure, preferably unpatented,
>shared-key encryption algorithms that could encrypt at ethernet speeds
>(1 MByte/sec) without using most of the CPU on a fast Pentium or
>equivalent processor?

RC4 is of course unpatented and faster than anything else.
Of course the name RC4 is trademarked, so you could simply 
call it "the well known algorithm" in your documentation 
and give the algorithm explicitly.

RSA's present legal gimmicks seem to me to be based on the "trade secret"
that RC4 really is the well known algorithm, so if you refrain from 
using the name "RC4", you should be OK.  (I am not a lawyer.)



T


>
>Thanks a lot,
>David
>
>
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd@echeque.com






Thread