From: Alan Olsen <alan@clueserver.org>
To: “Nobuki Nakatuji” <bd1011@hotmail.com>
Message Hash: b82cd648232f59edd878edd79d357e6c6683f08447c6fb14dc198954a6ff1d96
Message ID: <3.0.5.32.19980106215602.0098b670@clueserver.org>
Reply To: <19980107020417.23803.qmail@hotmail.com>
UTC Datetime: 1998-01-07 06:07:19 UTC
Raw Date: Wed, 7 Jan 1998 14:07:19 +0800
From: Alan Olsen <alan@clueserver.org>
Date: Wed, 7 Jan 1998 14:07:19 +0800
To: "Nobuki Nakatuji" <bd1011@hotmail.com>
Subject: Re: Is FEAL developed by NTT safe?
In-Reply-To: <19980107020417.23803.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980106215602.0098b670@clueserver.org>
MIME-Version: 1.0
Content-Type: text/plain
At 06:04 PM 1/6/98 PST, Nobuki Nakatuji wrote:
>
>>
>>In article <19980105070034.3946.qmail@hotmail.com> you write:
>>> Is FEAL developed by NTT safe? Where isn't safe if it is here because
>it
>>> isn't safe?
>>
>>FEAL is dead; I wouldn't ever use it in any new product.
>>Use triple-DES instead.
>>
>What kind of method was FEAL decoded in?
All of them.
If you take a look at _Applied Cryptography (2nd Edition)_, you will find a
number of different methods that have been used against FEAL.
It seems that whenever someone comes up with a new method of cryptanalysis,
they use it on FEAL first. (Or at least it seems that way...)
There are much better solutions. Unpatented ones as well...
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano@teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan@ctrl-alt-del.com|
Return to January 1998
Return to ““Nobuki Nakatuji” <bd1011@hotmail.com>”