-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello,
I understand that there are *some* security considerations when using CAST-128 (CAST5, as used in GnuPG), but this is typical of many ciphers in use today. In particular, a paper[1] on the linear cryptanalysis of reduced round versions of CAST-128 (used in GPG) and CAST-256 have produced successful known-plaintext and ciphertext-only attacks, though I'm not sure how computationally feasible they are. According to the paper, successful attacks were conducted on a 4 and 6 round version of CAST-128. Given that resources on the subject appear to be quite scarce, I come to you, O list. If anyone can clarify or elaborate on the security considerations of CAST-128, it would be greatly appreciated. Thanks, Dan [1]http://www.springerlink.com/content/978-3-642-04158-7/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkzAbTgACgkQiSdIUo/InI28+ACfVACyk61T5YC3BVQIIv6CwDJb N9kAnRm8qQH8JefFhmmsmW9hJgflOZvE =7+qZ -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users