[20456] in cryptography@c2.net mail archive
Re: bounded storage model - why is R organized as 2-d array?
daemon@ATHENA.MIT.EDU (Bill Stewart)
Fri Mar 10 09:51:16 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 10 Mar 2006 02:38:54 -0800
To: cryptography@metzdowd.com
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <20060309183658.GC3634@eff.org>
At 10:37 AM 3/9/2006, Chris Palmer wrote:
>Right, but even though a 1.5GHz machine is a bit old (heh...) for a
>workstation, my dinky little Linksys WRT54GC wireless AP still needs to
>AES-encrypt a theoretical maximum of 54Mbps when I turn on WPA.
Unless you're using your Linksys for file-sharing between machines at home,
you're not likely to be encrypting more than about 6 Mbps
(or whatever DSL and Cable Modem do these days in better cities.)
>Thus, something faster than AES, but still strong, would be nice. Your
>point about CPU cache size vs. pad size is well-taken, though.
I'd trust RC4-used-correctly before trusting Tri-Strata,
if there weren't so much bad history of people misusing RC4...
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com