[Ach] Cipher-Order: AES128/AES256 - was: Secure E-Mail Transport based on DNSSec/TLSA/DANE
Terje Elde
terje at elde.net
Mon Nov 9 13:32:51 CET 2015
> On 09 Nov 2015, at 13:23, Aaron Zauner <azet at azet.org> wrote:
>
> How exactly is CAMELLIA helping here? Such a key leak probably affects
> multiple ciphers.
Possibly, not probably. Depends on the leak really. For timing-attacks for example, susceptibility would depend not only on the algorithm, but the specific implementation of it.
If there’s ever an attack against hardware-implementations in a CPU (AESNI, similar from AMD etc), it’s very unlikely that it’d affect anything but AES, especially given that it’s typically the only symmetric block cipher that’s catered for.
Terje
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 524 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.cert.at/pipermail/ach/attachments/20151109/dd04511e/attachment.sig>
More information about the Ach
mailing list