[121553] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Cruising the stacks and finding stuff

daemon@ATHENA.MIT.EDU (Sandy Harris)
Thu Apr 24 17:52:52 2008

Date: Thu, 24 Apr 2008 07:22:45 +0800
From: "Sandy Harris" <sandyinchina@gmail.com>
To: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <20080423161803.GC28359@randombit.net>

Jack Lloyd <lloyd@randombit.net> wrote:

>  Making a cipher that uses an N bit key but is only secure to 2^M
>  operations with M<N is, firstly, considered broken in many circles, as
>  well as being inefficient (why generate/transmit/store 512 bit keys
>  when it only provides the security of a ~300 bit (or whatever) key
>  used with a perfect algorithm aka ideal cipher - why not use the
>  better cipher and save the bits).

Saving bits may not matter, or may not be possible. For example,
if you are ealing with a hybrid system -- say, using RSA to transmit
the symmetric cipher key or Diffie-Hellamn to construct it -- then for
any symmetric cipher key size less than the public key size, your
overheads are the same.

-- 
Sandy Harris,
Nanjing, China

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post