[Ach] Cipher-Order: AES128/AES256 - was: Secure E-Mail Transport based on DNSSec/TLSA/DANE

Terje Elde terje at elde.net
Mon Nov 9 13:32:51 CET 2015

> On 09 Nov 2015, at 13:23, Aaron Zauner <azet at azet.org> wrote:
> How exactly is CAMELLIA helping here? Such a key leak probably affects
> multiple ciphers.

Possibly, not probably.  Depends on the leak really.  For timing-attacks for example, susceptibility would depend not only on the algorithm, but the specific implementation of it.

If there’s ever an attack against hardware-implementations in a CPU (AESNI, similar from AMD etc), it’s very unlikely that it’d affect anything but AES, especially given that it’s typically the only symmetric block cipher that’s catered for.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 524 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.cert.at/pipermail/ach/attachments/20151109/dd04511e/attachment.sig>

More information about the Ach mailing list