[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] time to disable 3DES?
* Lee <ler762@xxxxxxxxx> [2013-10-07 21:49:29 -0400]:
> On 10/7/13, Yawning Angel <yawning@xxxxxxxxxxxxxxx> wrote:
> > * Lee <ler762@xxxxxxxxx> [2013-10-07 15:58:19 -0400]:
> >> Isn't it time to quit using DES?
> >>
> >> Finally gave TBB a try (version 2.3.25-13), seems to me that the
> >> firefox component needs a lot of hardening.
> >
> > DES != 3DES, and supporting 3DES suites is standard across major browsers.
>
> Right. But is it still safe to use?
Why wouldn't it be? As far as I can tell you have yet to come up with any
convincing reason as to why it's broken beyond "the NSA had a hand in it's
design[0]" and "the name has DES in it".
Note that Stephan Lucks' attack requires too many known plaintexts to be
relevant in this context and is still (probably) computationally infeasable.
> So... if you're visiting a web site that does only 3DES encryption,
> is that good enuf or do you say no thanks & go elsewhere?
*shrugs* If I noticed, it would be amusing since the webserver is buring a lot
of CPU by using 3DES, and I would question the system adminstrator's
sanity/competence, but on it's own, it's not a sufficient reason for me to
ignore the site.
This is getting offtopic so I will stop now.
--
Yawning Angel
[0]: If that's sufficient reason to drop something, the only cipher suite on the
list that you would have left is TLS_RSA_WITH_RC4_128_MD5.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk