exaexa / codecrypt

Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)
https://gitea.blesmrt.net/exa/codecrypt
GNU Lesser General Public License v3.0
308 stars 40 forks source link

Why ARCFOUR/RC4? #5

Closed ghost closed 10 years ago

ghost commented 10 years ago

Are plans for using Blowfish/AES/Serpent? Preferably serpent?

exaexa commented 10 years ago

OK, first why RC4:

Why NOT RC4:

Plans for other ciphers:

exaexa commented 10 years ago

Leaving this open for possible discussion/explanation about current RC4 usage.

exaexa commented 10 years ago

Awright, after some discussion and more research RC4 is going to get replaced in all internal stuff in next release. We now have XSYND and ChaCha20 implementations which more or less cover the properties of RC4; absolute RC4 avoidance will then depend on user choice -- I will certainly leave it there as an option.

The reason for doing this is the most recent attack on RC4, which gets reasonable results only from 2^24 pieces of keystream. While not practical yet, it may render RC4 insecure in some easily imaginable (although still uncommon/weird) situations.

Thanks for patience :]

exaexa commented 10 years ago

PS. Serpent/Camellia are implemented in Crypto++ (already a soft dependency) so there's no problem with supporting those now as well.

ghost commented 10 years ago

Thanks...