Closed Xartrick closed 2 months ago
The paragraph directly below what you quoted says this:
Another opinion is that the 448 bits limit is present to ensure that every bit of every subkey depends on every bit of the key,[5] as the last four values of the P-array don't affect every bit of the ciphertext. This point should be taken in consideration for implementations with a different number of rounds, as even though it increases security against an exhaustive attack, it weakens the security guaranteed by the algorithm. And given the slow initialization of the cipher with each change of key, it is granted a natural protection against brute-force attacks, which doesn't really justify key sizes longer than 448 bits.
Also, at least with the current workflows, this PR should get some build problems, 'cause notes/*_tv.txt
haven't been updated. For example, notes/cipher_tv.txt
contains vectors for blowfish with 8, 32 and 56 byte keys. With this change, I expect to see them replaced with vectors for 8, 40 and 72 byte keys.
Above comment being said, I don't see the harm with this change
Quote from Wikipedia :
Also,
bcrypt
usesblowfish
with a key length of up to 72 bytes.