gnupg website
Robert J. Hansen
rjh at sixdemonbag.org
Wed Jan 25 23:00:18 CET 2017
> The main problem would be its 64-bit block size. Apparently there's a
> "practical" attack against 64-bit ciphers as used in TLS [1].
Quoting from the abstract: "In our proof-of-concept demos, the attacker needs to capture about 785GB of data." I question the wisdom of any system which sends 785Gb of data without ever rekeying.
This attack seems to fall into the realm of "stupid SSL mistakes lead to exploitation. "
More information about the Gnupg-users
mailing list