[RC5] time spent on RC5-72

Fuzzy Logic fuzzymo at gmail.com
Tue Aug 28 16:03:54 EDT 2007

Bad assumption. Anything enciphered under that key would be exposed
once the key is figured out, even if you reencipher everything after
that point. One should use keys that will still protect the data until
it is no longer important, and should assume that any key used to
protect it will eventually be compromised.


On 8/28/07, Marcin Sochacki <wanted at gnu.univ.gda.pl> wrote:

> Let's assume 6 months as a reasonable time to crack a key and still be
> useful. Most security practices recommend changing your
> password/encryption key more often, but let's stay on the long end.

More information about the rc5 mailing list