• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Best Encryption Algorithm

nexus09

Member
I'm creating a new PGP keyring and am trying to decide which encryption algorithm would be best.
I'm trying to decide between
  • current AES standard (Rijndael)
  • CAST
  • TwoFish
I know twofish was one of the original candidates for AES, so I'm assuming since it wasn't selected that it is inferior to Rijndael. Opinions on this?
I don't know much about CAST at all.

Any help or information would be greatly appreciated.🙂
 
I would strongly go with a system that requires NO ENCRIPTION!! HA, j/k

i don't know off hand, but i would select whats behind door number 1. Provided you can impement it correctly.

-Steve
 
Since I'm just using it for PGP, there won't be any problem with implementation. I just wondered the details of each like speed and security.
 
AFAIK the Diffie-Hellman DSS standard which uses discrete logarithms is the strongest 'standard' encryption. Although it really depened on what kind of setup your looking for. Do you need a hashing algorthym, or a public / private key, etc, etc. If you just need hashing, then SHA-1 is the 'standard'.
 
I'm just doing public key/private key. Like I said I'm simply using this for my new PGP key.

Again, I've narrowed it down to AES, CAST, and Twofish those are my only options (I'm using PGP 8.0). Of those three, how do they compare with regards ot speed, strength, etc. And which, in your opinion, would best suit my purposes?
 
I would say that the one-time pad still provides encryption around. Mathematically unbreakable just works for me the way assumed to be unfeasible doesnt 🙂.

And for those who pooh pooh the idea as unfeasible, read up a bit on quantum cryptography, All you need is an optical fibre between you and the reciever with no repeater in the middle.

Anybody who wants to break quantum cryptography has to prove Heisenberg to be wrong first and I think they would be more concerned with other things than to try and read those raunchy emails you keep sending to your secratary 🙂.

Seriously though, I would say that having a password with mixed Alphanumeric with bost uppercase and lower case and making sure you dont keep a sticknote of your password on your monitor is going to be a far better detterent than the specifics of what algorithm you are using. Unless your trying to hide from the NSA, no other organisation except the Illuminatus have enough resources to crack any of them.
 
Back
Top