RE: Security Practices
From: Bryan McAninch (bryan_at_mcaninch.org)
To: <firstname.lastname@example.org> Date: Tue, 17 May 2005 15:34:21 -0500
The AES attack described by Dan Bernstein is impractical, as it requires an
enormous amount of known plaintext and is very timing sensitive.
Furthermore, the issue does not lie within the algorithm itself, but rather
how it is implemented. The paper specifically states that OpenSSL is
vulnerable, which makes OpenSSH vulnerable to the attack as well.
Stick with AES.
From: Nigel Stepp [mailto:email@example.com]
Sent: Tuesday, May 17, 2005 12:14 PM
To: David Busby
Subject: Re: Security Practices
David Busby wrote:
> I'm trying to get my a sshd setup as secure as possible, some folks
> I know what to send financial data over this.
> aes256-cbc cipher (only)
You may want to be aware of this paper. I believe the results are still
preliminary, but it's something to follow.
> I'm thinking that
> I'll make my key 4096bits to add some security.
Heh, is your name Avi? (cryptonomicon reference, couldn't resist) That's
probably overkill, but that assumes no codebreaking paradigm shifts or what
> Assume best means most secure even at
> the sacrifice of performance. Thanks!
If you're going to use 4096 bit keys, you may want to move away from md5 as
a hashing algorithm, since it has been shown to have some measure of
weakness. You might look at SHA256, SHA512, or something like whirlpool.
I'm not an expert, however, and I'm not sure how proven whirlpool really is
(or about the measure of support of these hashes in ssh).