emacs-diffs
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

emacs-29 6dca3a8eab2: Improve `nsm-protocol-check--3des-cipher` docstrin


From: Stefan Kangas
Subject: emacs-29 6dca3a8eab2: Improve `nsm-protocol-check--3des-cipher` docstring
Date: Tue, 24 Oct 2023 19:12:56 -0400 (EDT)

branch: emacs-29
commit 6dca3a8eab24135cff56ac1f4671040ef73e9ba3
Author: Stefan Kangas <stefankangas@gmail.com>
Commit: Stefan Kangas <stefankangas@gmail.com>

    Improve `nsm-protocol-check--3des-cipher` docstring
    
    * lisp/net/nsm.el (nsm-protocol-check--3des-cipher): Update
    docstring to reflect current NIST policy.
---
 lisp/net/nsm.el | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/lisp/net/nsm.el b/lisp/net/nsm.el
index dc04bf50c24..870ab3066a8 100644
--- a/lisp/net/nsm.el
+++ b/lisp/net/nsm.el
@@ -550,14 +550,14 @@ Due to its use of 64-bit block size, it is known that a
 ciphertext collision is highly likely when 2^32 blocks are
 encrypted with the same key bundle under 3-key 3DES.  Practical
 birthday attacks of this kind have been demonstrated by Sweet32[1].
-As such, NIST is in the process of disallowing its use in TLS[2].
+As such, NIST has disallowed its use after December 31, 2023[2].
 
 [1]: Bhargavan, Leurent (2016).  \"On the Practical (In-)Security of
 64-bit Block Ciphers — Collision Attacks on HTTP over TLS and
 OpenVPN\", `https://sweet32.info/'
-[2]: NIST Information Technology Laboratory (Jul 2017).  \"Update to
-Current Use and Deprecation of TDEA\",
-`https://csrc.nist.gov/News/2017/Update-to-Current-Use-and-Deprecation-of-TDEA'"
+[2]: National Institute of Standards and Technology (Mar 2019).
+\"Transitioning the Use of Cryptographic Algorithms and Key
+Lengths\", `https://doi.org/10.6028/NIST.SP.800-131Ar2'"
   (let ((cipher (plist-get status :cipher)))
     (and (string-match "\\b3DES\\b" cipher)
          (format-message



reply via email to

[Prev in Thread] Current Thread [Next in Thread]