weak keys was: RE: Slicing and dicing

Greg Carter <greg.carter@entrust.com> Fri, 12 September 1997 20:18 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id QAA09928 for ipsec-outgoing; Fri, 12 Sep 1997 16:18:40 -0400 (EDT)
Message-ID: <c=CA%a=_%p=NorTel_Secure_Ne%l=APOLLO-970912201942Z-47880@mail.entrust.com>
From: Greg Carter <greg.carter@entrust.com>
To: "'Michael C. Richardson'" <mcr@sandelman.ottawa.on.ca>
Cc: "'ipsec@tis.com'" <ipsec@tis.com>
Subject: weak keys was: RE: Slicing and dicing
Date: Fri, 12 Sep 1997 16:19:42 -0400
X-Mailer: Microsoft Exchange Server Internet Mail Connector Version 4.0.993.5
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

>  The world isn't just DES, though. The question about what to do with
>weak keys in general. Are weak keys in other algorithms equally
>improbable? 

CAST128 has no known weak keys.
----
Greg Carter, Entrust Technologies
greg.carter@entrust.com
Get FREE FIPS-140-1 Validated Crypto for the desktop
http://www.entrust.com/solo.htm

>