AES256 & AES192. (Was: Can I revitalise an old key-pair?)
Nicholas Cole
nicholas.cole at gmail.com
Mon Sep 2 20:28:09 CEST 2013
On Mon, Sep 2, 2013 at 5:04 AM, Henry Hertz Hobbit
<hhhobbit at securemecca.net> wrote:
[snip]
>
> Paradoxically, AES256 & AES192 had
> weaknesses that made them less safe than AES (AES-128) several
> years back. May I humbly suggest TWOFISH or one of the
> CAMELLLIA ciphers as a first choice UNTIL you determine whether
> or not the fixes for AES-256 and AES-192 are retroactive? DID
> THEY GET THEM FIXED? I am just assuming they did but that means
> I HOPE the older implementation and the newer one can easily be
> discerned when you do the decipher.
[snip]
I was curious about this. The wikipedia page mentions the "Related Key
Attack" on these cyphers, but is vague about whether they were ever
fixed.
Does anyone know?
And did fixes make it into the version used by Gnupg?
More information about the Gnupg-users
mailing list