1997-05-11 - Re: The War is Underway (fwd)

Header Data

From: “Mark M.” <markm@voicenet.com>
To: cypherpunks <unicorn@schloss.li>
Message Hash: e1f2a170ce82173ecd050f96ac4a3016546d8fbb6021f13e61bb8252b9b88b40
Message ID: <Pine.LNX.3.95.970510192350.2999A-100000@purple.voicenet.com>
Reply To: <Pine.SUN.3.96.970510181630.9012N-100000@polaris.mindport.net>
UTC Datetime: 1997-05-11 01:05:37 UTC
Raw Date: Sun, 11 May 1997 09:05:37 +0800

Raw message

From: "Mark M." <markm@voicenet.com>
Date: Sun, 11 May 1997 09:05:37 +0800
To: cypherpunks <unicorn@schloss.li>
Subject: Re: The War is Underway (fwd)
In-Reply-To: <Pine.SUN.3.96.970510181630.9012N-100000@polaris.mindport.net>
Message-ID: <Pine.LNX.3.95.970510192350.2999A-100000@purple.voicenet.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 10 May 1997, Black Unicorn wrote:

> The amount of confusion over what represents a good algorithm is also
> interesting.  Take CAST, which seems a promising cipher and which we
> considered using over IDEA.
> 
> On asking 4 "experts" about CAST, I got 4 answers.
> 
> 1>  A 64 bit cipher with 40 bits secret.
> 2>  A 64 bit cipher - not expected to be very complete.
> 3>  A 128 bit cipher.
> 4>  "Not worth discussing."
> 
> In fact, as I understand it, CAST is of variable key length (Up to 128
> bits), and quite resistant to many attacks which plague DES and even IDEA.
> 
> But digging out that information was painfully difficult.  (It may not
> even be correct).

According to _Applied Cryptography_, CAST is a Feistel cipher with a 64-bit
block length and 64-bit key length.  So far, brute force is the only known
attack.

As far as "obscenely large" key lengths are concerned, 3-key triple DES
uses a 168-bit key.  This is used in many crypto packages, including
export-controlled Netscape, and is being considered as a replacement for
DES in the U.S.  Triple DES will probably also be supported in the next
version of PGP.  Blowfish supports keys as long as 448 bits and RC4
supports keys up to 2048 bits.  The problem with variable length ciphers
is that programs that use them to not actually take advantage of variable
keys and just stick to using keys of a fixed, and small, size.

Using large key sizes for passphrase-based systems is difficult, because
it's just too difficult to remember a passphrase with enough entropy to
make a difference.  Assuming a random passphrase with 6 bits of entropy
per character, over 21 characters would have to be used for there to be
128 bits of entropy.  Systems that use randomly generated keys are
limited only by the amount of available entropy, but then the passphrase
security to encrypt the secret key or physical security become important.
Using excessively long keys does not do much for security, as there are
always going to be weaker links that an attacker can take advantage of.
It doesn't hurt to use a 256-bit key, or larger, but it doesn't do much
good, either.



Mark
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3
Charset: noconv

iQEVAwUBM3UK/yzIPc7jvyFpAQEhIwf+NYr0gHWWd2r056+MCZp/v5Y5KmpdxSz8
mXOM+GOm4bxk5OufCcw7FWKoJYNxklII3yDl1s9+xd5iegwX7T+rRWo1qc1/MAOJ
JJdMxy87T6qHgO28GUa6eNe/3g9d76z4U3E95u4mNMVs4mEQcD16lgXpfZPDZO0z
c7SxEfAK2rCxZeakZ0c/QEgraWIYLjpyl0EsHNVw+PszlGtrQKEFSJNSGI9dhKkc
WT6oHiisE1F+GNLn7PyBzby8HxEW9zwWSU3coa75yqwHfNNVCkb/s2Yh3cyw5LhP
mrMlQcVBH6A4J5iJQJcEfoKN9p+rZA/Rl5FjApWFG3cVMxq0ZXGjZg==
=eI9X
-----END PGP SIGNATURE-----






Thread