Bruce Schneier (schneier@counterpane.com)
Wed, 24 Jun 1998 08:50:27 -0500
At 12:54 PM 6/24/98 +0000, Jesús Cea Avión wrote:
>> > Blowfish's "key schedule" is pretty big... I would consider SAFER
>> > for the block cipher myself.
>>
>> Do you know the distributions restrictions on SAFER? If I do manage to
>> get the whole thing working, I'd like the patches to be usable by the
>> Linux kernel team.. which would mean that commercial use is fine.
>
>You can try TEA (http://vader.brad.ac.uk/tea/tea.shtml). It's simple and
>fast. It doesn´t require extra memory or tables, and there is no setup
>time. 64bits blocks and 128bits keys.
>
>Anybody knows about TEA cryptoanalisys (I already read the paper about
>modified TEA)?. It´s safe enough?. I'm developing a distributed DB for
>ESNET (a spanish IRC network) and it uses TEA for nick registration and
>database integrity check.
I have never been a TEA fan, although 64 rounds can cure a lot of sins.
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
http://www.counterpane.com
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:18:57 ADT