Why is blowfish so slow? Other fast algorithms?

James A. Donald jamesd at echeque.com
Wed Jan 24 23:58:26 PST 1996


At 07:32 PM 1/23/96 -0500, David A Wagner wrote:

>If you want authentication, you must use a crypto-strength MAC.
>Encryption (be it RC4, DES, etc.) is not enough.

Not so:  If the message is encrypted and checksummed with a simple
not non cryptographic checksum, this gives you everything a MAC 
gives you, plus the message is secret.

MACs are only useful in the strange and unsual case where you want
authentification using a symmetric key, but you want to transmit in
the clear.  I cannot see any reason why anyone would ever wish to use
a MAC except perhaps to obey government bans on encrypted messages.

 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd at echeque.com







More information about the cypherpunks-legacy mailing list