block-cipher weakness? - was: Re: twofish keysize
Atom 'Smasher'
atom-gpg at suspicious.org
Mon Apr 26 18:54:34 CEST 2004
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Thu, 22 Apr 2004, Per Tunedal Casual wrote:
> On average 32 GB is the limit i.e. the probability is 50 % that an
> adversary finds two identical blocks. But you might have bad luck and
> he might find two identical blocks in somewhat smaller files.
===============================
can someone explain to me why/how it's a vulnerability if an attacker
finds more than one block of cipher text that are the same?
would there be a benefit of using a stream cipher for large files?
is there a reason why OpenPGP doesn't specify any stream ciphers?
thanks...
...atom
_________________________________________
PGP key - http://atom.smasher.org/pgp.txt
3EBE 2810 30AE 601D 54B2 4A90 9C28 0BBF 3D7D 41E3
-------------------------------------------------
_
_(_)_ wWWWw _
@@@@ (_)@(_) vVVVv _ @@@@ (___) _(_)_
@@()@@ wWWWw (_)\ (___) _(_)_ @@()@@ Y (_)@(_)
@@@@ (___) `|/ Y (_)@(_) @@@@ \|/ (_)\
/ Y \| \|/ /(_) \| |/ |
\ | \ |/ | / \ | / \|/ |/ \| \|/
\\|// \\|/// \\\|//\\\|/// \|/// \\\|// \\|// \\\|//
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (FreeBSD)
Comment: What is this gibberish? - http://atom.smasher.org/links/#digital_signatures
iEYEARECAAYFAkCNPs8ACgkQnCgLvz19QeNY7gCdExdCYs5LFApqwkVEvOA89Tv4
JjYAnjMB7gTyMSAQFrkEeQM7JrdAtj6Q
=FngB
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list