[16773] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Is 3DES Broken?

daemon@ATHENA.MIT.EDU (Daniel Carosone)
Wed Feb 2 09:08:40 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 2 Feb 2005 08:44:00 +1100
From: Daniel Carosone <dan@geek.com.au>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: Aram Perez <aramperez@mac.com>,
	Cryptography <cryptography@metzdowd.com>
Mail-Followup-To: "Steven M. Bellovin" <smb@cs.columbia.edu>,
	Aram Perez <aramperez@mac.com>,
	Cryptography <cryptography@metzdowd.com>
In-Reply-To: <20050201033853.C55B43BFED4@berkshire.machshav.com>


--9jxsPFA5p3P2qPhR
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Jan 31, 2005 at 10:38:53PM -0500, Steven M. Bellovin wrote:
> When using CBC mode, one should not encrypt more than 2^32 64-bit=20
> blocks under a given key.  That comes to ~275G bits, which means that=20
> on a GigE link running flat out you need to rekey at least every 5=20
> minutes, which is often impractical.=20

Notably for those encrypting data at rest, it's also rather smaller
than current hard disk sizes, which are much harder to re-key.

(Even for those only encrypting data in flight, it has practical
implications regarding the feasibility of capturing that data for later
analysis)

--
Dan.

--9jxsPFA5p3P2qPhR
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (NetBSD)

iD8DBQFB//gfEAVxvV4N66cRAhdDAJ9RVzrtIPhC7efgnqU7SPoMvzjmbwCggfsh
NozNrM9hBqSyutY0G5S+Qo0=
=AsqU
-----END PGP SIGNATURE-----

--9jxsPFA5p3P2qPhR--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post