M Taylor (mctaylor@mta.ca)
Wed, 24 Jun 1998 14:57:25 -0300
At 05:56 PM 6/24/98 +0000, you wrote:
>[TEA]
>> It has also been broken, hasn't it?
>
>Do you have any reference?.
Check the extended version of TEA
<http://www.cl.cam.ac.uk/ftp/users/djw3/xtea.ps>
three related-key attacks
http://www.cs.berkeley.edu/~daw/keysched-crypto96.ps
three other equivalent keys
http://www.cs.berkeley.edu/~daw/keysched-icics97.ps
>> SAFER doesn't strike me as a good idea, but TEA *really* doesn't
>> strike me as a good idea.
attacks
ftp://ftp.esat.kuleuven.ac.be/pub/COSIC/knudsen/trunc_dif_saf.ps.Z
>Why not?. I need a *simple*, *lightning* fast crypt, without setup
>overhead. Streng is important but only for "domestic" attacks, since
>each register is crypted using its unique "user provided but server
There is SEAL from IBM is really fast, but patented in USA.
http://wwwcsif.cs.ucdavis.edu/~rogaway/papers/seal.ps
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:18:58 ADT