[176] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: 40-bit rc2/4

daemon@ATHENA.MIT.EDU (Lucky Green)
Wed Feb 5 23:01:29 1997

Date: Wed, 05 Feb 1997 17:00:16 -0800
To: Michael Paul Johnson <mikej2@Exabyte.COM>
From: Lucky Green <shamrock@netcom.com>
Cc: cryptography@c2.net

At 01:24 PM 2/5/97 -0700, Michael Paul Johnson wrote:
>For example,
>Blowfish and Diamond2 are both designed (intentionally) to make rekeying
>the cipher a much slower operation than encryption and decryption, thus
>offering much better performance to the honest user than to the spy.

Interesting. RSA touts their RC-5 cipher as not spending much time in key
scheduling. Can somebody confirm this?


-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred

   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi

home help back first fref pref prev next nref lref last post