tag:blogger.com,1999:blog-15110991.post112360758284283182..comments2024-01-13T11:15:30.670+01:00Comments on SIGINT CHATTER: Obesitas CryptologicasDirk Rijmenantshttp://www.blogger.com/profile/03973502421787834920noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-15110991.post-1123609552862801322005-08-09T19:45:00.000+02:002005-08-09T19:45:00.000+02:00Well, let's hope they do a good job designing them...Well, let's hope they do a good job designing them. Never the less, we're feeding all those top ace math guys, on NSA's payrole, with lots of data to work throug. Seems a solid career choise for a life time employment. I must call Chief Spook for an interview ;-))Dirk Rijmenantshttps://www.blogger.com/profile/03973502421787834920noreply@blogger.comtag:blogger.com,1999:blog-15110991.post-1123609018978877002005-08-09T19:36:00.000+02:002005-08-09T19:36:00.000+02:00I agree that modern computing is fairly lazy when ...I agree that modern computing is fairly lazy when it comes to conserving resources -- this can be an annoying trend. I like things like Linux for that; you can cut out a lot of the overhead and pretty graphics if you want. But I'm not sure I agree that <I>Obisitas Cryptoligicas</I> is a problem when it comes to crypto, at least if you stick to solid, peer-reviewed algorithms like AES and Triple-DES.<BR/><BR/>Modern cipher design is very conservative. Cryptographers create algorithms able to resist not just known-plaintext attacks (cribbing), but much stronger attacks, such as chosen-plaintext attacks, chosen-ciphertext attacks, or even implausible things like related-key attacks. In fact, if you can find a way to distinguish the output of a cipher from random in any way whatsoever, that's counted as a weakness.Matt Cryptohttps://www.blogger.com/profile/09068112841971037007noreply@blogger.com