Re: Blowfish reliability

Liste des GroupesRevenir à s crypt 
Sujet : Re: Blowfish reliability
De : peter (at) *nospam* tsto.co.uk (Peter Fairbrother)
Groupes : sci.crypt
Date : 15. Jul 2025, 22:25:50
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <1056h0u$a0n8$1@dont-email.me>
References : 1
User-Agent : Mozilla Thunderbird
On 15/07/2025 16:54, Anonymous wrote:
   Is this blog post significant?
<https://hatchjs.com/cryptographydeprecationwarning-blowfish-has-been-deprecated/>
 
Somewhat, though nothing new.
Blowfish uses 64-bit blocks which can lead to birthday and other collision attacks - nowadays even 128 bits isn't really enough for a new block cipher (some may disagree). 3DES has the same block size problem.
Blowfish is also susceptible to meet-in-the-middle and differential attacks. The variable key size is also problematic.
Implemented properly Blowfish is still secure - but it is getting harder to implement it properly, and some older implementations may no longer be secure. You have to worry about total traffic encrypted under one key, key size, some restrictions in modes - so overall it is considered better to use something more modern.
Also again, as it is being deprecated, some platforms may no longer support it.
Peter Fairbrother

Date Sujet#  Auteur
15 Jul 25 * Blowfish reliability7Anonymous
15 Jul 25 +- Re: Blowfish reliability1Peter Fairbrother
15 Jul 25 `* Re: Blowfish reliability5Rich
16 Jul 25  `* Re: Blowfish reliability4The Running Man
16 Jul 25   `* Re: Blowfish reliability3Rich
16 Jul 25    `* Re: Blowfish reliability2Stefan Claas
16 Jul 25     `- Re: Blowfish reliability1Rich

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal