[Cryptography] Dumb question -> 3AES?
Dan McDonald
danmcd at kebe.com
Mon Aug 11 16:50:21 EDT 2014
On Mon, Aug 11, 2014 at 10:45:37PM +0200, Natanael wrote:
<SNIP!>
> So 3AES isn't good enough for hedging against flaws found in AES in the
> future, unless your ONLY worry is for a PARTIAL reduction in strength. If
> there's a total break, 3AES won't help you.
I'm less worried about the AES algorithm being broken (and yes, I understand
about 3des's effective key strength) as I am against Moore's law (and yes, I
also understand that the 9nm node may be the last one using current
technologies) and long periods of time. I may be (unnecessarily) worried
about someone brute-forcing the data over decades.
Pardon the parentheses,
Dan
More information about the cryptography
mailing list