Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 29 Mar 2005 11:51:01 +0300 (EEST)
From:      Jari Kirma <kirma@cs.hut.fi>
To:        doc@freebsd.org
Subject:   bdes(1) maybe a bit out of date?
Message-ID:  <Pine.GSO.4.61.0503291141240.10106@hutcs.cs.hut.fi>

next in thread | raw e-mail | index | archive | help

The following paragraph on bdes(1) manual page might give a wrong 
impression regarding the practical security of (one-time) DES encryption 
these days:

"The DES is considered a very strong cryptosystem, and other than table 
lookup attacks, key search attacks, and Hellman's time-memory tradeoff 
(all of which are very expensive and time-consuming), no cryptanalytic 
methods for breaking the DES are known in the open literature.  No doubt 
the choice of keys and key security are the most vulnerable aspect of
bdes."

Sure, DES is cryptographically reasonably strong, but 2^56 key space has 
been considered vulnerable to exhaustive key search for several years. 
Triple DES is safe, but it seems bdes doesn't implement it. Maybe the 
above paragraph should be toned down, or a warning should be added.

-kirma



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.61.0503291141240.10106>