[16773] in cryptography@c2.net mail archive
Re: Is 3DES Broken?
daemon@ATHENA.MIT.EDU (Daniel Carosone)
Wed Feb 2 09:08:40 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 2 Feb 2005 08:44:00 +1100
From: Daniel Carosone <dan@geek.com.au>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: Aram Perez <aramperez@mac.com>,
Cryptography <cryptography@metzdowd.com>
Mail-Followup-To: "Steven M. Bellovin" <smb@cs.columbia.edu>,
Aram Perez <aramperez@mac.com>,
Cryptography <cryptography@metzdowd.com>
In-Reply-To: <20050201033853.C55B43BFED4@berkshire.machshav.com>
--9jxsPFA5p3P2qPhR
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Mon, Jan 31, 2005 at 10:38:53PM -0500, Steven M. Bellovin wrote:
> When using CBC mode, one should not encrypt more than 2^32 64-bit=20
> blocks under a given key. That comes to ~275G bits, which means that=20
> on a GigE link running flat out you need to rekey at least every 5=20
> minutes, which is often impractical.=20
Notably for those encrypting data at rest, it's also rather smaller
than current hard disk sizes, which are much harder to re-key.
(Even for those only encrypting data in flight, it has practical
implications regarding the feasibility of capturing that data for later
analysis)
--
Dan.
--9jxsPFA5p3P2qPhR
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (NetBSD)
iD8DBQFB//gfEAVxvV4N66cRAhdDAJ9RVzrtIPhC7efgnqU7SPoMvzjmbwCggfsh
NozNrM9hBqSyutY0G5S+Qo0=
=AsqU
-----END PGP SIGNATURE-----
--9jxsPFA5p3P2qPhR--
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com