update summary of defectoscopy

[Imported from Trac: page Bibliography, version 44]
zooko 2009-10-07 17:53:00 +00:00
parent 342582d784
commit d09fabc75c

@ -11,7 +11,7 @@ Here are some papers that are potentially of interest.
[The European Stream Cipher project](http://www.ecrypt.eu.org/stream) which evaluated many stream ciphers including Salsa20 [The European Stream Cipher project](http://www.ecrypt.eu.org/stream) which evaluated many stream ciphers including Salsa20
[defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure. AES-128 is predicted to be insecure. Salsa20 is predicted to be secure. [defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that MD4, MD5, SHA-0, SHA-1, SHA-2-256, and GOST are predicted to be insecure, while Tiger is predicted to be secure. AES-128 is predicted to be insecure. Salsa20 is predicted to be secure.
### Elliptic Curve Cryptography ### Elliptic Curve Cryptography