Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: colin Newsgroups: sci.crypt Subject: Re: What are the chances of this encrytion being broken? Date: Wed, 26 Mar 2025 13:29:38 +1300 Organization: A noiseless patient Spider Lines: 16 Message-ID: References: <4c1bfc3d01c8a48ad81d1fbf4587e5431cd9389b@i2pn2.org> <20250325tu215422@o15.ybtra.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Wed, 26 Mar 2025 01:29:40 +0100 (CET) Injection-Info: dont-email.me; posting-host="a96a7db7b22985873dd35cf789087eb8"; logging-data="539659"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+8Gnq6c3vDb6+OOsWx0d7xaRuFPchWlZs=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:NLVsxsk2uCMarHPhF/kncZkRQTU= Content-Language: en-US In-Reply-To: On 26/03/25 12:00, Richard Heathfield wrote: > On 25/03/2025 21:54, Marcel Logen wrote: >> 512 bytes of plaintext become 528 bytes of ciphertext >> with AES256 CBC (without salt). > > Why do people keep suggesting AES? What am I missing? > Hi Richard AFAICT nothing Colin