Is ccrypt AES 256 bit crypto secure enough?


 
Thread Tools Search this Thread
Special Forums Cybersecurity Is ccrypt AES 256 bit crypto secure enough?
# 8  
Old 06-13-2014
Router

You can download the source code to any cipher and impliment it, strictly speaking, they are all open source, including MD6.

The block size and key size are always a factor but strictly speaking you should never need to impliment a stream cipher with a value greater than !n20

I should have called myself Kiss-Ass when I join your forum!

Lets look at what we can find and download for free on the Wiki...

RipeMD160 No attacks known. All results concern simplified variants.

Then we have Keccak, Fugue, ECHO, Blue Midnight Wish, Skein, Groestl, Tiger, Botan, SANDstorm, SWIFFTX... All with no known attack vector!

Some of them wont stand up to cryptanalysis but getting around them is a whole new kettle of fish!

!Enjoy

Dont you just love it when you read the news and hear people that dont know the first thing about programming saying "we'll decrypt the web"... Have they been smoking crack?

http://www.moviesounds.com/matrix/choice.mp3

Awesome thing about some of the technology in use before all this crazy crap started, some of it already impliments Open Hardware, that means the Cryptographic Hash Functions are built in, they have to be - to protect Buisness from Spies & Insider Trading! An it goes without saying to keep "the real Cyber Criminals" Out!

Last edited by Opr_Sys; 06-13-2014 at 06:08 PM..
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Programming

Publish and Subscribe to AES-256 Encrypted MQTT Messages to Node-RED from PHP Scripts

Various Node-Red crypto modules do not work with PHP, so to send an encrypted message from a PHP script (in this case from a Ubuntu server) to Node-RED we need our own code. After a few hours of searching, testing various libs, more testing and debugging, I got this PHP to Node-RED code... (0 Replies)
Discussion started by: Neo
0 Replies

2. UNIX for Dummies Questions & Answers

Using sed with special characters produced from crypto

Hey there, I'm facing some weird issues with sed when trying to do substitution in a text file with the content of some environment variables. Those variables are used to store crypted (3DES) info with much special characters and that's where the problem starts. I've already tried to use both... (7 Replies)
Discussion started by: Jormun
7 Replies

3. Programming

JAVA AES keylength exception

I am developing a JAVA application that must encrypt its data. On my development machine, I can use a 256 bit key with no problem. A test machine throws an exception complaining about an illegal key length. The test machine is using JRE 1.6u21. Does anyone know where I can get a version of the JRE... (1 Reply)
Discussion started by: ilikecows
1 Replies

4. Programming

AES encryption

Hi, Any body can please point me to source code for implementing AES encryption in CTR mode i.e RFC 3686 (AES-CTR).I did googling but no good results. (6 Replies)
Discussion started by: Raom
6 Replies

5. UNIX for Advanced & Expert Users

encrypting file system using AES 256 bit

Experts, I am trying to encrypt my filesystem using the AES 256 bit type of encryption. I am using FreeBSD 5.4 and need to encrypt one of the mounted points. Does anybody have any good idea of how to do it? Is there any documentation about encrypting the disk partition as this method is more... (2 Replies)
Discussion started by: jimmynath
2 Replies
Login or Register to Ask a Question