On Thu, Jul 17, 2014 at 11:29 AM, Dana Jacobsen via RT
<bug-Crypt-Rijndael@rt.cpan.org> wrote:
Show quoted text> <URL:
https://rt.cpan.org/Ticket/Display.html?id=97258 >
>
> On Tue Jul 15 13:16:28 2014, RURBAN wrote:
>
> Wouldn't replacing this implementation with an alternate implementation be another option? With Crypt::OpenSSL::AES, you're using whatever happens to get loaded in libcrypt at runtime. We can hope that it is an error-free version of actual OpenSSL...
Well, you can never be sure with openssl, but it's at least multitudes
better than the current naive version in Crypt-Rijndael. openssl got
much more eyes, and Crypt-Rijndael got zero.
Show quoted text> This assumes that there is a good and correct alternate AES implementation available, and that we none of this is rendered moot by someone managing to have alternate versions of the Perl modules loaded.
Relying on standard security libraries is much better then relying on
a bad and unmaintained implementation.
These attacks are known for a decade.
Show quoted text
Of course bernsteins version looks better, but qhasm is not really
portable. openssl is.
good qhasm versions do exist for ppc32, x86, sparcv9 and amd64.
Personally I would only trust bernstein and polarssl, not openssl nor
libressl, but we cannot have everything.
--
Reini Urban
http://cpanel.net/ http://www.perl-compiler.org/