Security considerations: CAST-128
Dan Cowsill
danthehat at gmail.com
Thu Oct 21 18:41:28 CEST 2010
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello,
I understand that there are *some* security considerations when using
CAST-128 (CAST5, as used in GnuPG), but this is typical of many ciphers
in use today. In particular, a paper[1] on the linear cryptanalysis of
reduced round versions of CAST-128 (used in GPG) and CAST-256 have
produced successful known-plaintext and ciphertext-only attacks, though
I'm not sure how computationally feasible they are. According to the
paper, successful attacks were conducted on a 4 and 6 round version of
CAST-128.
Given that resources on the subject appear to be quite scarce, I come to
you, O list. If anyone can clarify or elaborate on the security
considerations of CAST-128, it would be greatly appreciated.
Thanks,
Dan
[1]http://www.springerlink.com/content/978-3-642-04158-7/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkzAbTgACgkQiSdIUo/InI28+ACfVACyk61T5YC3BVQIIv6CwDJb
N9kAnRm8qQH8JefFhmmsmW9hJgflOZvE
=7+qZ
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list