[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Phil Zimmerman on 'The Death of DES'
Single DES is weak, for a known plaintext attack. I think we knew that.
We didn't know how weak.
We can extrapolate to an NSA machine with 1 second scan of all keys,
perhaps.
So --
1. use triple DES
2. before using DES, XOR with a stream from a decent PRNG (destroying
the known plaintext)
3. in between DES operations, mix bytes up as with tran (posted on
sci.crypt occasionally, avbl from me by mail or on ripem.msu.edu)
-- spreading bytes out within a huge block, further hiding any
known text
- Carl