123446 <lizzy_> hi guys123504 <lizzy_> we have a BIG problem, at the Pre-panic stage:123523 <lizzy_> look at today's slashdot.org123550 <lizzy_> Cryptography is all about safety margins. If you can break n round of a cipher, you design it with 2n or 3n rounds. What we're learning is that the safety margin of AES is much less than previously believed. And while there is no reason to scrap AES in favor of another algorithm, NST should increase the number of rounds of all three AES variants -- now, before there is a reason to panic.123614 <lizzy_> At this point, I suggest AES-128 at 16 rounds, AES-192 at 20 rounds, and AES-256 at 28 rounds. Of maybe even more; we don't want to be revising the standard again and again.123614 <lizzy_> And, even more strongly, I suggest that people don't use AES-256. AES-128 provides more than enough security margin for the forseeable future.123614 <lizzy_> Schneier on Security: Another New AES Attack (1 August 2009)123614 <lizzy_> http://www.schneier....another_new_aes.html123614 <lizzy_> http://snipurl.com/ogstr124102 <lizzy_> ..124143 <lizzy_> i also propose that the number of rounds used be shown ,eg: AES256-16125559 <lizzy_> see also: slashdot.org
Page created in 0.027 seconds with 29 queries.