Re: Blowfish reliability

Liste des GroupesRevenir à s crypt 
Sujet : Re: Blowfish reliability
De : stefan (at) *nospam* mailchuck.com (Stefan Claas)
Groupes : sci.crypt
Date : 16. Jul 2025, 11:56:26
Autres entêtes
Organisation : i2pn2 (i2pn.org)
Message-ID : <e2c72181e3dd67456e89e80fcfb086873803871f@i2pn2.org>
References : 1 2 3
User-Agent : flnews/1.3.0pre31 (for GNU/Linux)
Rich wrote:
The Running Man <running_man@writeable.com> wrote:
On 16/07/2025 00:07 Rich <rich@example.invalid> wrote:
Anonymous <nobody@yamn.paranoici.org> wrote:
  Is this blog post significant?
<https://hatchjs.com/cryptographydeprecationwarning-blowfish-has-been-deprecated/>
 
The major significance is this sentence fragment from the first
paragraph:
 
    "and should not be used for new applications."
 
Don't start a new project and pick Blowfish as the cipher.
 
 
I can't conjure up any application which uses Blowfish, except
maybe older versions of TrueCrypt and E4M.
 
At this point, they would all likely be old legacy applications, few of
which are likely still in use.

The problem is that the OP is one of many people from a.p.a-s who are
still using old hard/software and are not upgrading nor following the
latests best security practices.

Regards
Stefan

Date Sujet#  Auteur
15 Jul 25 * Blowfish reliability7Anonymous
15 Jul 25 +- Re: Blowfish reliability1Peter Fairbrother
15 Jul 25 `* Re: Blowfish reliability5Rich
16 Jul 25  `* Re: Blowfish reliability4The Running Man
16 Jul 25   `* Re: Blowfish reliability3Rich
16 Jul 25    `* Re: Blowfish reliability2Stefan Claas
16 Jul 25     `- Re: Blowfish reliability1Rich

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal