Strongest Key, Hash, and Cypher Algorithms

Chris De Young chd at chud.net
Mon Feb 7 22:44:09 CET 2005


Ryan Malayter wrote:
> Of
> course, the same was said about RC4 many years ago, and AFAIK there are
> still no attacks better than brute force against the RC4 algorithm
> itself (protocol issues in WEP don't count).

RC4 has some classes of weak keys, as I recall.  Implementations can work 
around these problems, but I would still tend to classify that as a 
weakness in the algorithm rather than in the implementation.  Pedantic, 
perhaps, but anyway... :)

-Chris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 256 bytes
Desc: OpenPGP digital signature
Url : /pipermail/attachments/20050207/efe554fd/signature.pgp


More information about the Gnupg-users mailing list