[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
emacs-29 6dca3a8eab2: Improve `nsm-protocol-check--3des-cipher` docstrin
From: |
Stefan Kangas |
Subject: |
emacs-29 6dca3a8eab2: Improve `nsm-protocol-check--3des-cipher` docstring |
Date: |
Tue, 24 Oct 2023 19:12:56 -0400 (EDT) |
branch: emacs-29
commit 6dca3a8eab24135cff56ac1f4671040ef73e9ba3
Author: Stefan Kangas <stefankangas@gmail.com>
Commit: Stefan Kangas <stefankangas@gmail.com>
Improve `nsm-protocol-check--3des-cipher` docstring
* lisp/net/nsm.el (nsm-protocol-check--3des-cipher): Update
docstring to reflect current NIST policy.
---
lisp/net/nsm.el | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/lisp/net/nsm.el b/lisp/net/nsm.el
index dc04bf50c24..870ab3066a8 100644
--- a/lisp/net/nsm.el
+++ b/lisp/net/nsm.el
@@ -550,14 +550,14 @@ Due to its use of 64-bit block size, it is known that a
ciphertext collision is highly likely when 2^32 blocks are
encrypted with the same key bundle under 3-key 3DES. Practical
birthday attacks of this kind have been demonstrated by Sweet32[1].
-As such, NIST is in the process of disallowing its use in TLS[2].
+As such, NIST has disallowed its use after December 31, 2023[2].
[1]: Bhargavan, Leurent (2016). \"On the Practical (In-)Security of
64-bit Block Ciphers — Collision Attacks on HTTP over TLS and
OpenVPN\", `https://sweet32.info/'
-[2]: NIST Information Technology Laboratory (Jul 2017). \"Update to
-Current Use and Deprecation of TDEA\",
-`https://csrc.nist.gov/News/2017/Update-to-Current-Use-and-Deprecation-of-TDEA'"
+[2]: National Institute of Standards and Technology (Mar 2019).
+\"Transitioning the Use of Cryptographic Algorithms and Key
+Lengths\", `https://doi.org/10.6028/NIST.SP.800-131Ar2'"
(let ((cipher (plist-get status :cipher)))
(and (string-match "\\b3DES\\b" cipher)
(format-message
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- emacs-29 6dca3a8eab2: Improve `nsm-protocol-check--3des-cipher` docstring,
Stefan Kangas <=