> The main problem would be its 64-bit block size. Apparently there's a
> "practical" attack against 64-bit ciphers as used in TLS [1].

Quoting from the abstract:  "In our proof-of-concept demos, the attacker needs 
to capture about 785GB of data."  I question the wisdom of any system which 
sends 785Gb of data without ever rekeying.

This attack seems to fall into the realm of "stupid SSL mistakes lead to 
exploitation. "



_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to