From bf6f42e333ba3c43d0e45d0c42eb1aab88f266d0 Mon Sep 17 00:00:00 2001 From: zooko <> Date: Fri, 31 Jul 2009 16:05:07 +0000 Subject: [PATCH] add note about AES-128 and Salsa20 on defectoscopy.com [Imported from Trac: page Bibliography, version 40] --- Bibliography.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Bibliography.md b/Bibliography.md index 549fbc0..2e88ed7 100644 --- a/Bibliography.md +++ b/Bibliography.md @@ -15,7 +15,7 @@ Here are some papers that are potentially of interest. [Cryptanalysis of the Tiger Hash Function](https://online.tu-graz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263) by Mendel and RIjmen -[defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure. +[defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure. AES-128 is predicted to be insecure. Salsa20 is predicted to be secure. ### Elliptic Curve Cryptography