[cryptography] NIST Workshop on Elliptic Curve Cryptography Standards

Ryan Carboni ryacko at gmail.com
Wed May 13 02:34:58 EDT 2015


On Tue, May 12, 2015 at 5:00 PM, <dj at deadhat.com> wrote:

> >
> > There is a very simple way around this. Block XXTEA introduced a new
> > method
> [snip]
> >
> > Although for the internet and smart cards, data packets are small enough
> > for 64 bit blocks not to matter as long as you rekey between packets.
> >
>
> To paraphrase Bowman: "Oh my God. It's full of integer adders!"
> Integer adders don't pass the sniff test for lightweight hardware.
>
> Alas, the world isn't just the internet and smart cards. We are throwing
> crypto on silicon as fast as we can to address the many threats to
> computer hardware. No one block size is correct.
>
>
>
Did you some how miss the suggestion to convert AES to the same method by
using XORs?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20150512/e02ecd76/attachment.html>


More information about the cryptography mailing list