Date: Tue, 29 Mar 2005 11:51:01 +0300 (EEST) From: Jari Kirma <kirma@cs.hut.fi> To: doc@freebsd.org Subject: bdes(1) maybe a bit out of date? Message-ID: <Pine.GSO.4.61.0503291141240.10106@hutcs.cs.hut.fi>
next in thread | raw e-mail | index | archive | help
The following paragraph on bdes(1) manual page might give a wrong impression regarding the practical security of (one-time) DES encryption these days: "The DES is considered a very strong cryptosystem, and other than table lookup attacks, key search attacks, and Hellman's time-memory tradeoff (all of which are very expensive and time-consuming), no cryptanalytic methods for breaking the DES are known in the open literature. No doubt the choice of keys and key security are the most vulnerable aspect of bdes." Sure, DES is cryptographically reasonably strong, but 2^56 key space has been considered vulnerable to exhaustive key search for several years. Triple DES is safe, but it seems bdes doesn't implement it. Maybe the above paragraph should be toned down, or a warning should be added. -kirma
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.61.0503291141240.10106>