Security considerations: CAST-128

Dan Cowsill danthehat at gmail.com
Thu Oct 21 18:41:28 CEST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

I understand that there are *some* security considerations when using
CAST-128 (CAST5, as used in GnuPG), but this is typical of many ciphers
in use today.  In particular, a paper[1] on the linear cryptanalysis of
reduced round versions of CAST-128 (used in GPG) and CAST-256 have
produced successful known-plaintext and ciphertext-only attacks, though
I'm not sure how computationally feasible they are.  According to the
paper, successful attacks were conducted on a 4 and 6 round version of
CAST-128.

Given that resources on the subject appear to be quite scarce, I come to
you, O list.  If anyone can clarify or elaborate on the security
considerations of CAST-128, it would be greatly appreciated.

Thanks,
Dan

[1]http://www.springerlink.com/content/978-3-642-04158-7/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzAbTgACgkQiSdIUo/InI28+ACfVACyk61T5YC3BVQIIv6CwDJb
N9kAnRm8qQH8JefFhmmsmW9hJgflOZvE
=7+qZ
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list