[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Blowfish ain't broken
> Jerry Whiting writes:
> > One reason we chose to use Blowfish as the basis for carrick is that
> > it _is_ a new algorithm. One has to assume that the NSA et al. has
> > tools optimized to crack DES and possibly IDEA/RSA. At least let's
> > give them something else to sweat over.
>
> Perry writes:
> They won't sweat over it long. Blowfish was broken.
My understanding is that Blowfish using only 3 rounds, not the full 16, has been
broken. And yes, duplicate entries in an S-box are weak keys.
carrick uses the full 16 rounds and we check for weak keys.
I'll sleep at night.
Jerry Whiting