>> there's no known practical attack on it. It performs well. So it is > > ^^^^^ > > That's the word, of course... Any government that discovers a successful > attack is going to keep quiet.
Except in a certain side-channel sense -- any government that discovers a successful attack on an encryption algorithm it regularly uses will know that other parties could have discovered the same attack, and will then need to limit its use of the compromised algorithm. That behavior change will be observed by other parties and will prompt suspicion about a possible vulnerability. Unless the party that discovered the vulnerability stepped up use of the compromised algorithm, but only for unimportant data or misinformation... Oh, security headgames. On Tue, Feb 24, 2009 at 5:27 AM, Ron Johnson <ron.l.john...@cox.net> wrote: > On 02/24/2009 02:36 AM, Tzafrir Cohen wrote: > [snip] >> >> Anyway, the AES cipher is one that is very well studied. It has been >> implemented all over. Just about anybody have tried to attack it and yet >> there's no known practical attack on it. It performs well. So it is > > ^^^^^ > > That's the word, of course... Any government that discovers a successful > attack is going to keep quiet. > >> a very sane choice as a block cipher. > > -- > Ron Johnson, Jr. > Jefferson LA USA > > The feeling of disgust at seeing a human female in a Relationship > with a chimp male is Homininphobia, and you should be ashamed of > yourself. > > > -- > To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject > of "unsubscribe". Trouble? Contact listmas...@lists.debian.org > > -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org