Re: Blowfish reliability

Liste des GroupesRevenir à s crypt 
Sujet : Re: Blowfish reliability
De : rich (at) *nospam* example.invalid (Rich)
Groupes : sci.crypt
Date : 25. Jul 2025, 19:15:16
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <1060hjk$21ebo$1@dont-email.me>
References : 1 2 3 4 5
User-Agent : tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Chax Plore <nznmrqmrxr@qazk.bet> wrote:
On 2025-07-24 22:03, Rich wrote:
Chax Plore <nznmrqmrxr@qazk.bet> wrote:
>
Someone rescaled Blowfish to 128-bit blocks:
>
https://alexpukall.github.io/blowfish2/blowfish2-gcc.txt
>
But the memory print of this version is monstrous.
 
Can you quantify "monstrous"?  Just how big is that?
 
In this particular case: 16912 bytes total of P-box and S-boxes onstants.

While that may very well be significantly larger than other algorithms,
unless you are working in a very RAM constrained embedded system, ~16k
of state is not likely to be significant for most systems.  And even if
one were doing some kind of network server where each network link
consumed that amount for 'state', 1GiB of RAM would still hold enough
state blocks for 63,489 simultaneous network flows.  And any server
meant for that much networking is likely going to have by far more than
1GiB of RAM installed.


Date Sujet#  Auteur
15 Jul 25 * Blowfish reliability12Anonymous
15 Jul 25 +* Re: Blowfish reliability6Peter Fairbrother
24 Jul18:48 i`* Re: Blowfish reliability5Chax Plore
24 Jul21:03 i `* Re: Blowfish reliability4Rich
24 Jul21:11 i  +- Re: Blowfish reliability1Chris M. Thomasson
25 Jul09:30 i  `* Re: Blowfish reliability2Chax Plore
25 Jul19:15 i   `- Re: Blowfish reliability1Rich
15 Jul 25 `* Re: Blowfish reliability5Rich
16 Jul 25  `* Re: Blowfish reliability4The Running Man
16 Jul 25   `* Re: Blowfish reliability3Rich
16 Jul 25    `* Re: Blowfish reliability2Stefan Claas
16 Jul 25     `- Re: Blowfish reliability1Rich

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal