1996-09-25 - Re: WARNING: This Message Actually Contains a Question

Header Data

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: b0bbd61f333fe668cd148b7ab7d275ac4e73dcbbd35d7d385e1feda9beb28012
Message ID: <us9suD24w165w@bwalk.dm.com>
Reply To: <199609250610.XAA23137@dfw-ix12.ix.netcom.com>
UTC Datetime: 1996-09-25 16:21:32 UTC
Raw Date: Thu, 26 Sep 1996 00:21:32 +0800

Raw message

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 26 Sep 1996 00:21:32 +0800
To: cypherpunks@toad.com
Subject: Re: WARNING: This Message Actually Contains a Question
In-Reply-To: <199609250610.XAA23137@dfw-ix12.ix.netcom.com>
Message-ID: <us9suD24w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


Bill Stewart <stewarts@ix.netcom.com> writes:
> Bruce Schneier's book Applied Cryptography discusses
> Blowfish (no surprise, since it's his algorithm) and
> I think also discusses GOST.  Blowfish is very fast
> once you've finished the (deliberately slow) key schedule.
> It appears to be tolerably strong, though there hasn't
> been as much analysis on it as on RC4 or IDEA yet, much less DES.

A widely available C implementation of Blowfish had a bug, weakening
its security under some circumstances. Make sure to use the corrected
version. (The bug was in the C program, not the algorithm itself.)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





Thread