Re: Blowfish reliability

Liste des GroupesRevenir à s crypt 
Sujet : Re: Blowfish reliability
De : nznmrqmrxr (at) *nospam* qazk.bet (Chax Plore)
Groupes : sci.crypt
Date : 25. Jul 2025, 09:30:59
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <105vfc8$10f3u$1@dont-email.me>
References : 1 2 3 4
On 2025-07-24 22:03, Rich wrote:
Chax Plore <nznmrqmrxr@qazk.bet> wrote:
>
Someone rescaled Blowfish to 128-bit blocks:
>
https://alexpukall.github.io/blowfish2/blowfish2-gcc.txt
>
But the memory print of this version is monstrous.
 Can you quantify "monstrous"?  Just how big is that?
 
In this particular case: 16912 bytes total of P-box and S-boxes onstants.
--
-----BEGIN PGP PUBLIC KEY FINGERPRINT-----
5745 807C 2B82 14D8 AB06 422C 8876 5DFC 2A51 778C
------END PGP PUBLIC KEY FINGERPRINT------

Date Sujet#  Auteur
15 Jul 25 * Blowfish reliability12Anonymous
15 Jul 25 +* Re: Blowfish reliability6Peter Fairbrother
24 Jul18:48 i`* Re: Blowfish reliability5Chax Plore
24 Jul21:03 i `* Re: Blowfish reliability4Rich
24 Jul21:11 i  +- Re: Blowfish reliability1Chris M. Thomasson
25 Jul09:30 i  `* Re: Blowfish reliability2Chax Plore
25 Jul19:15 i   `- Re: Blowfish reliability1Rich
15 Jul 25 `* Re: Blowfish reliability5Rich
16 Jul 25  `* Re: Blowfish reliability4The Running Man
16 Jul 25   `* Re: Blowfish reliability3Rich
16 Jul 25    `* Re: Blowfish reliability2Stefan Claas
16 Jul 25     `- Re: Blowfish reliability1Rich

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal