Jesús Cea Avión (jcea@argo.es)
Wed, 24 Jun 1998 08:54:31 -0400
> > Blowfish's "key schedule" is pretty big... I would consider SAFER
> > for the block cipher myself.
>
> Do you know the distributions restrictions on SAFER? If I do manage to
> get the whole thing working, I'd like the patches to be usable by the
> Linux kernel team.. which would mean that commercial use is fine.
You can try TEA (http://vader.brad.ac.uk/tea/tea.shtml). It's simple and
fast. It doesn´t require extra memory or tables, and there is no setup
time. 64bits blocks and 128bits keys.
Anybody knows about TEA cryptoanalisys (I already read the paper about
modified TEA)?. It´s safe enough?. I'm developing a distributed DB for
ESNET (a spanish IRC network) and it uses TEA for nick registration and
database integrity check.
Any pointer?
-- Jesus Cea Avion _/_/ _/_/_/ _/_/_/ jcea@argo.es http://www.argo.es/~jcea/ _/_/ _/_/ _/_/ _/_/ _/_/ _/_/ _/_/ _/_/_/_/_/ PGP Key Available at KeyServ _/_/ _/_/ _/_/ _/_/ _/_/ "Things are not so easy" _/_/ _/_/ _/_/ _/_/ _/_/ _/_/ "My name is Dump, Core Dump" _/_/_/ _/_/_/ _/_/ _/_/ "El amor es poner tu felicidad en la felicidad de otro" - Leibnitz
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:18:57 ADT