[27622] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Status of attacks on AES?

daemon@ATHENA.MIT.EDU (Max)
Fri Jun 9 10:21:15 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 8 Jun 2006 14:20:14 -0700
From: Max <maxale@gmail.com>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: "Marcos el Ruptor" <Ruptor@cryptolib.com>,
	cryptography@metzdowd.com
In-Reply-To: <20060608121706.f4425dab.smb@cs.columbia.edu>

On 6/8/06, Steven M. Bellovin <smb@cs.columbia.edu> wrote:

> You say you have a method to evaluate ciphers.  Without full details, no
> one can form their own judgment if it's valid or not.  (My "proposal"
> clearly isn't valid.)  You say you've evaluated AES and other ciphers.
> Without full details, we don't know if your evaluation is correct.

I think they can prove their evaluation without publishing all the details.
What they need is just to provide an access to their distinguisher in
the form of blackbox.
To prove its meaningfulness, the distinguisher must show consistent
results in distinguishing AES-encrypted data (say, for a fixed
plaintext without repeating blocks on their choice) from random data.

Max

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post