gnupg website

sivmu sivmu at web.de
Wed Jan 25 23:18:25 CET 2017



Am 25.01.2017 um 23:00 schrieb Robert J. Hansen:
>> The main problem would be its 64-bit block size. Apparently there's a
>> "practical" attack against 64-bit ciphers as used in TLS [1].
> 
> Quoting from the abstract:  "In our proof-of-concept demos, the attacker needs to capture about 785GB of data."  I question the wisdom of any system which sends 785Gb of data without ever rekeying.
> 
> This attack seems to fall into the realm of "stupid SSL mistakes lead to exploitation. "
> 

There are prove of concepts against TLS and openvpn https://sweet32.info/

It is not quite that simple I think.



More information about the Gnupg-users mailing list