[Cryptography] Dumb question -> 3AES?

Dan McDonald danmcd at kebe.com
Mon Aug 11 16:50:21 EDT 2014


On Mon, Aug 11, 2014 at 10:45:37PM +0200, Natanael wrote:
<SNIP!>
> So 3AES isn't good enough for hedging against flaws found in AES in the
> future, unless your ONLY worry is for a PARTIAL reduction in strength. If
> there's a total break, 3AES won't help you.

I'm less worried about the AES algorithm being broken (and yes, I understand
about 3des's effective key strength) as I am against Moore's law (and yes, I
also understand that the 9nm node may be the last one using current
technologies) and long periods of time.  I may be (unnecessarily) worried
about someone brute-forcing the data over decades.

Pardon the parentheses,
Dan


More information about the cryptography mailing list