Christian Weisgerber wrote:
Kurt Mosiejczuk <k...@se.rit.edu> wrote:
And AES-128 (and only that flavor of AES, so far) has a crack making
decrypting it significantly quicker.
News to me. Reference?
(You are probably confusing this with the related-key attacks on
AES-192 and AES-256.)
That may be what happened. I remember thinking I'd throw in the
reference when I was making my initial email, but decided not to. Now
when I look for it, I'm mainly seeing those related-key attacks and the
reduced-round attacks (that seem to effect all 3).
I will humbly plead that my brain was addled from prepping for the
return of students next week.
Speedwise, Blowfish and AES are similar,
My understanding is that actually, blowfish is significantly slower.
Go and run "openssl speed aes-128-cbc bf-cbc" on a number of machines
and architectures. There is quite a bit of variation.
I did mention that it was in particular the key setup that was slow.
Running the test like you suggested I am seeing variation. I think I
may crawl back into my hole again.
--Kurt