Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not to mention that a large set of keys are known to be reflectively weak under Blowfish:

http://iacr.org/archive/fse2007/45930168/45930168.pdf

And of course there's ciphertext malleability attacks as it's not using authenticated encryption



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: