Hi Victor,

PKI Handshakes are always the cause of worry when it comes to performance
but now I am facing problems even with the normal encryption. The data size
is around 2k. Woud you suggest using RC4-MD5?

On Thu, Jun 5, 2008 at 9:12 PM, Victor Duchovni <
[EMAIL PROTECTED]> wrote:

> On Thu, Jun 05, 2008 at 08:20:31PM -0700, Ace wrote:
>
> >      I know that DHE-RSA-AES256-SHA is more secure than RC4-SHA
>
> The DHE part especially, as it yields forward-secrecy. So far, RC4
> with fully random keys has held up reasonably well.
>
> > but it needs
> > more computation power and RC4-MD5 is faster.
>
> > I saw the mixed response on
> > RC4-MD5 usage. OpenSSL lists it as medium strength cipher but I found
> that
> > many people have listed attacks on this, possible in an hour.
>
> 1 hour attacks against 128-bit RC4 are not yet published in the academic
> (non-military) crypto community.
>
> > What is the
> > releality? How much secure is to go with RC4-MD5? Is there any other
> suite
> > that is faster and secure too than DHE-RSA-AES256-SHA? I know that DES
> and
> > 3DES are bad. What about IDEA-CBC-SHA? It is faster but is it secure too?
>
> What problem are you solving? Is bulk encryption performance (as opposed
> to say, PKI handshakes, ...) really your bottleneck?
>
> --
>        Viktor.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>



-- 
I may be miles away... but I am just a email away.... so keep emailing...!!!
Cheers,
Rajan

Reply via email to