Cruising the stacks and finding stuff
Sandy Harris
sandyinchina at gmail.com
Wed Apr 23 19:22:45 EDT 2008
Jack Lloyd <lloyd at randombit.net> wrote:
> Making a cipher that uses an N bit key but is only secure to 2^M
> operations with M<N is, firstly, considered broken in many circles, as
> well as being inefficient (why generate/transmit/store 512 bit keys
> when it only provides the security of a ~300 bit (or whatever) key
> used with a perfect algorithm aka ideal cipher - why not use the
> better cipher and save the bits).
Saving bits may not matter, or may not be possible. For example,
if you are ealing with a hybrid system -- say, using RSA to transmit
the symmetric cipher key or Diffie-Hellamn to construct it -- then for
any symmetric cipher key size less than the public key size, your
overheads are the same.
--
Sandy Harris,
Nanjing, China
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list