Larger cryptographic cyphers - /g/ (#105980088) [Archived: 217 hours ago]

Anonymous
7/21/2025, 8:08:02 PM No.105980088
1750645970019379
1750645970019379
md5: 26e39cc6ca52d7b9760b84565d37200c🔍
Why isn't there a larger block cypher, one bigger and better than Rijndael (AES)?

A cypher with a 256 bit data block and a 256 or 512 bit key.

Everyone says you don't need one, "just use one with 128 bit data blocks, bro". I believe that's false, if all the hardware used to train AI is used to break AES instead, it could easily achieve practical results.

I suspect there's a conspiracy going around, to keep you using low bit cryptography, so they can break it some time in the future.
Replies: >>105980120 >>105980197 >>105981093 >>105982242 >>105984258 >>105984281 >>105984595 >>105985168 >>105986576 >>105986681
Anonymous
7/21/2025, 8:12:16 PM No.105980120
>>105980088 (OP)
Because the NSA (and friends) controls encryption routines and hires everyone that has the skill to make decent ones. Encryption for the public is kept breakable on purpose so they can monitor all communications.
Replies: >>105981358
Anonymous
7/21/2025, 8:19:46 PM No.105980174
you mean like chacha20?
Anonymous
7/21/2025, 8:22:37 PM No.105980197
>>105980088 (OP)
ChaCha20 operates on 512 bit blocks with a 256 bit key. Threefish supports key size and block size up to 1024 bits. There's also Lion.
Replies: >>105980236 >>105980885 >>105981761
Anonymous
7/21/2025, 8:27:55 PM No.105980236
>>105980197
Oh and SHACAL2 has 256-bit block with 512-bit key

Personally I just stick with ChaCha20 or AES cause they're standard and had the most analysis done on them.
Replies: >>105980885
Anonymous
7/21/2025, 9:36:46 PM No.105980885
>>105980197
Threefist
>In October 2010, an attack that combines rotational cryptanalysis with the rebound attack was published. The attack mounts a known-key distinguisher against 53 of 72 rounds in Threefish-256, and 57 of 72 rounds in Threefish-512. It also affects the Skein hash function.[2] This is a follow-up to the earlier attack published in February, which breaks 39 and 42 rounds respectively.[4] In response to this attack, the Skein team tweaked the rotation constants used in Threefish and thereby the key schedule constants for round 3 of the NIST hash function competition.
This looks quite bad.

Lion
It's based on combining other ciphers, it's not independent.

ChaCha20
>bernstein
>pushed by google, used by everyone
Maybe they know some of its weaknesses.
>a += b; d ^= a; d <<<= 16;
>c += d; b ^= c; b <<<= 12;
>a += b; d ^= a; d <<<= 8;
>c += d; b ^= c; b <<<= 7;
Why rotate by 7 instead of 4? Why these numbers (16 12 8 7) and not prime numbers (19 13 7 5)? Why are the numbers in descending order?
The complete addition operation assumes a carry input and a carry output to chain the addition over multiple numbers. That carry could be used, either original or negated or flipped based on the key, to carry more diffusion. By using simple addition without carry you're constantly introducing a 0 bias on each operation.

>>105980236
SHACAL2
Each round does barely any operations on the state, looks sparse, it mostly moves data around.
Replies: >>105981243 >>105981243 >>105981594 >>105983021
Anonymous
7/21/2025, 9:58:30 PM No.105981093
>>105980088 (OP)
>if all the hardware used to train AI is used to break AES instead, it could easily achieve practical results.
prove it
Anonymous
7/21/2025, 10:16:08 PM No.105981243
>>105980885
>>105980885
Those sort of academic attacks exist for AES and ChaCha20 and I think some other ciphres too. They break 10 out of 14 rounds or 8 out of 20 rounds, but at enormous impractical cost and that's still not the full cipher.

>Bernstein
>Google
I don't know why that's a bad thing necessarily. Is more obscure better in your opinion? Or what would be more trustworthy in your view? For what it's worth, Bernstein didn't come up with it whole cloth, he just tweaked Salsa20. You can tweak it again if you feel your design is better.

Here's a link where the rationale behind the numbers is discussed: https://cr.yp.to/chacha/chacha-20080128.pdf

>Sparse
Is that necessarily a bad thing? In the Argon2 paper the authors say that simpler functions are better because they're easier to analyze and harder to mess up and introduce vulnerabilities inadvertently.
Replies: >>105981438 >>105981948 >>105982972
Anonymous
7/21/2025, 10:30:41 PM No.105981358
>>105980120
>there is no autistic schizo that would spot something weird in open and public / common encryption ciphers
I think your take is attempting to sound smart but falls in the retarded category
Replies: >>105981438 >>105982339
Anonymous
7/21/2025, 10:40:51 PM No.105981438
>>105981358
>>105981243
I read it and it's basically
>salsa is doing something
>I change it so it looks simpler
>"difference in security appears to be negligible"
Bruh
Replies: >>105981579
Anonymous
7/21/2025, 10:58:06 PM No.105981579
>>105981438
ChaCha diffusion is better (12.5 bits difference in output per 1-bit change in input vs. Salsa's 8 bits) but changing the rotation distances had negligible impact, is what I got from that.
Anonymous
7/21/2025, 10:59:40 PM No.105981594
>>105980885
the common reason to not use carry results is that there are no SIMD instructions with them
Anonymous
7/21/2025, 11:04:33 PM No.105981640
>anime
cringe
Replies: >>105984297
Anonymous
7/21/2025, 11:20:31 PM No.105981761
>>105980197
Also ChaCha20 is not a block cipher but who's counting.
Anonymous
7/21/2025, 11:41:11 PM No.105981948
>>105981243
>You can tweak it again if you feel your design is better.
Also probably NOT a good idea to this lol. At least the standard advice is don't roll your own crypto.
Anonymous
7/22/2025, 12:16:03 AM No.105982242
Screenshot from 2025-07-21 17-15-12
Screenshot from 2025-07-21 17-15-12
md5: 29eb4a152840074b7c2edb10e6e9e2b5🔍
>>105980088 (OP)
>he doesn't know about Threefish
Anonymous
7/22/2025, 12:25:22 AM No.105982339
>>105981358
If such a person came here to announce he'd broken some encryption widely used this is what would happen:
>you'd call him a schizo
>his thread would get instantly slid while demoralization shills paid for by the state would bully him
>he'd get a knock at the door
>glow niggers would offer him a job
>if he refused and posted online that the glow niggers visited him you'd call him a schizo
>he's publish post on multiple platforms announcing that if he's anhero'd he'd never do such a thing, isn't sad but is in fear of his life
>the state would black bag him
>the state would stage an anhero
>you'd all laugh and call him pathetic
>years later a handful of people would post about him now and again (RIP Ian)
>you'd call them schizos

Tell me I'm wrong.
Replies: >>105985585 >>105986890
Anonymous
7/22/2025, 1:36:45 AM No.105982972
>>105981243
Bernstein made Salsa20 too. He also came up with commonly used elliptic curves in public key cryptography.
Anonymous
7/22/2025, 1:44:30 AM No.105983021
>>105980885
>Why these numbers (16 12 8 7) and not prime numbers (19 13 7 5)?
524288, 8192, 128, and 32 arent prime numbers, anon...

>he doesnt know bitshift is defined in terms of mul/div 2^rhs
Replies: >>105983036
Anonymous
7/22/2025, 1:47:10 AM No.105983036
>>105983021
You rotate by a prime number of bits, not by half/quarter of the data type.
Replies: >>105983239
Anonymous
7/22/2025, 2:13:15 AM No.105983239
>>105983036
congrats, you have the reading comprehension of a brain damaged turtle
Anonymous
7/22/2025, 5:08:35 AM No.105984258
>>105980088 (OP)
Block size isn't very relevant to the security of a cipher.
Anonymous
7/22/2025, 5:12:05 AM No.105984281
>>105980088 (OP)
>He thinks AES 256 is realistically breakable

kek
Anonymous
7/22/2025, 5:15:03 AM No.105984297
jnofihnuersigbea
jnofihnuersigbea
md5: 139928fa7593ea549f8a03385cf013d1🔍
>>105981640
>being this butt hurt
You silly boy! :3
Anonymous
7/22/2025, 6:10:43 AM No.105984595
>>105980088 (OP)
use case for strong cryptography????
Replies: >>105984750
Anonymous
7/22/2025, 6:53:24 AM No.105984750
>>105984595
use case for your existence?
Anonymous
7/22/2025, 8:36:13 AM No.105985168
9
9
md5: 5a7b04931108a4e9fb617c4efc200a43🔍
>>105980088 (OP)
what a cutie pie
Anonymous
7/22/2025, 10:24:26 AM No.105985548
So, besides the algorithms listed above, are there really no other block ciphers with 256 bit blocks and 256 or 512 bit keys?
Also, looking at the way ciphers are internally designed, I firmly begin believing there's some kind of inherent undisclosed weakness in them.
Replies: >>105987342
Anonymous
7/22/2025, 10:31:11 AM No.105985585
>>105982339
>you'd all laugh and call him pathetic
There's two possible scenarios. Either he's right in which case he is a pathetic retard to making the same mistakes dozens have made before him or he's a larping nigger in which case he is also pathetic if for different reasons. Either way I do not give a shit and neither does anyone else.
Anonymous
7/22/2025, 1:30:38 PM No.105986576
taclane
taclane
md5: 8008b45c195f443d59940b79273667e5🔍
>>105980088 (OP)
there are. normal ass TLS can go up to 2048 iirc, just no one uses it except for banks and FetLife.COM
"analog" encryptors are still around and use keys of arbitrary length that you can generate yourself. Picrel is a Network Object(tm) but outputs to serial if you want and also uses fuckhuge keys
Anonymous
7/22/2025, 1:48:38 PM No.105986681
>>105980088 (OP)
>block cipher
ngmi
Stream ciphers are where it's at.
Anonymous
7/22/2025, 2:17:50 PM No.105986890
>>105982339
if it was true he would provide proof (or the proof that he was able to benefit from his findings which would only be possible if what he claims is true) and the information would be widely known in all countries in all fields, private, public, maths forums, etc
retard
Anonymous
7/22/2025, 3:07:20 PM No.105987342
>>105985548
>Also, looking at the way ciphers are internally designed, I firmly begin believing there's some kind of inherent undisclosed weakness in them.
Why
Anonymous
7/22/2025, 3:32:20 PM No.105987590
Anyone thinking 512 bit keys is reasonable has no idea what they are talking about not how huge that is.
Even 256 bit AES is fine against quantum computing.
Anonymous
7/22/2025, 3:50:09 PM No.105987724
After looking at bouncycastle API which seems to be the most comprehensive crypto library in terms of including various ciphers, other ciphers that may match OP's wants are: Kalyna, RC4 (seems to have suspected weaknesses), HC-256, VMPC and ZUC.

If none of these are good enough for you you'll have to roll your own crypto which is heavily advised against from what I've seen.

https://javadoc.io/doc/org.bouncycastle/bcprov-jdk14/1.74/org/bouncycastle/jcajce/provider/symmetric/util/BaseBlockCipher.html

https://javadoc.io/static/org.bouncycastle/bcprov-jdk14/1.74/org/bouncycastle/jcajce/provider/symmetric/util/BaseStreamCipher.html