@ianbfarquhar @Falkvinge that’s called an OPSEC failure. It won’t help in pure cryptanalysis of e.g AES, Salsa, Chacha
@ianbfarquhar and let me restate my position: encrypting known plaintext with modern ciphers is commonplace and there are no known attacks
-
-
@bascule I concur. But I focus on the "known". Unless there is formal proof that no KP attacks will ever be found... (More) -
@ianbfarquhar you should probably be more worried about related key attacks on AES and the AES key schedule in general -
@bascule I do worry about related key attacks. Got a ref to issues with the AES key schedule concern? Not followed that.
End of conversation
New conversation -
-
-
@bascule My contention is that minimizing their impact by minimizing KP availability to an attacker represents best practice.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.