On Mon, Sep 2, 2013 at 5:04 AM, Henry Hertz Hobbit
<hhhob...@securemecca.net> wrote:

[snip]

>
>  Paradoxically, AES256 & AES192 had
> weaknesses that made them less safe than AES (AES-128) several
> years back.  May I humbly suggest TWOFISH or one of the
> CAMELLLIA ciphers as a first choice UNTIL you determine whether
> or not the fixes for AES-256 and AES-192 are retroactive?  DID
> THEY GET THEM FIXED?  I am just assuming they did but that means
> I HOPE the older implementation and the newer one can easily be
> discerned when you do the decipher.


[snip]

I was curious about this. The wikipedia page mentions the "Related Key
Attack" on these cyphers, but is vague about whether they were ever
fixed.

Does anyone know?

And did fixes make it into the version used by Gnupg?

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to