[3390] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Fwd: Re: r.e. quality of IDEA...

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Mon Sep 28 18:39:19 1998

To: Greg Rose <ggr@qualcomm.com>
cc: "David G. Koontz" <koontz@ariolimax.com>, cryptography@c2.net
Date: Fri, 25 Sep 1998 18:41:53 -0400
From: "Steven M. Bellovin" <smb@research.att.com>

In message <199809252106.HAA11077@avalon.qualcomm.com>, Greg Rose writes:
>"David G. Koontz" writes:
>>A quick look at the source for IDEA shows that the key for IDEA doesn't
>>require
>>prescheduling.  
>
>It is true that for encryption, there is relatively little benefit from 
>the precomputed key schedule. For decryption, though... this is not 
>entirely true. The decryption keys require the modular multiplication 
>inverses. This can be done by lookup in a 128K table on the fly, but 
>that's back to real estate. Or they can be computed on the fly, but that 
>requires the extended Euclidean algorithm. There are probably tradeoffs 
>in there between these approaches, but it might be worth caching the key 
>schedules.
>
>Of course you could just encrypt all the time, and never decrypt... :-)

Y'know, I was about to say the same thing, but I decided I'd look at
the source first.  And when I did, I was puzzled, because I didn't
see any calculation of inverses, but I knew they had to be there.  Not
wanting to appear a fool, I held my mouth pending further investigation.
It took your tongue-in-cheek comment to make me realize exactly what
was going on.  The routine I was looking at *was* just encrypting, even
in the decrypt routine, because it was the IDEA routine in ssh, which
uses CFB mode...



home help back first fref pref prev next nref lref last post