From 2859ca23da5d0d4f13b129796b72ba9de52100df Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dag-Erling=20Sm=C3=B8rgrav?= Date: Sat, 21 Sep 2013 11:10:09 +0000 Subject: Replace claims that DES is a strong cryptosystem with a warning stating that it should no longer be considered secure. Approved by: re (gjb) --- secure/usr.bin/bdes/bdes.1 | 35 +++++++---------------------------- 1 file changed, 7 insertions(+), 28 deletions(-) (limited to 'secure/usr.bin') diff --git a/secure/usr.bin/bdes/bdes.1 b/secure/usr.bin/bdes/bdes.1 index 8863a8420c52..86df614b77da 100644 --- a/secure/usr.bin/bdes/bdes.1 +++ b/secure/usr.bin/bdes/bdes.1 @@ -35,12 +35,12 @@ .\" @(#)bdes.1 8.1 (Berkeley) 6/29/93 .\" $FreeBSD$ .\" -.Dd June 29, 1993 +.Dd September 20, 2013 .Dt BDES 1 .Os .Sh NAME .Nm bdes -.Nd "encrypt/decrypt using the Data Encryption Standard (DES)" +.Nd "encrypt / decrypt using the Data Encryption Standard (DES)" .Sh SYNOPSIS .Nm .Op Fl abdp @@ -51,6 +51,11 @@ .Op Fl o Ar N .Op Fl v Ar vector .Sh DESCRIPTION +.Bf -symbolic +The DES cipher should no longer be considered secure. +Please consider using a more modern alternative. +.Ef +.Pp The .Nm utility implements all @@ -215,22 +220,6 @@ is given in binary or hex, and can be disabled for .Tn ASCII keys as well. -.Pp -The -.Tn DES -is considered a very strong cryptosystem, -and other than table lookup attacks, -key search attacks, -and Hellman's time-memory tradeoff -(all of which are very expensive and time-consuming), -no cryptanalytic methods -for breaking the -.Tn DES -are known in the open literature. -No doubt the choice of keys -and key security -are the most vulnerable aspect of -.Nm . .Sh IMPLEMENTATION NOTES For implementors wishing to write software compatible with this program, @@ -347,16 +336,6 @@ OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .Ed .Sh BUGS -There is a controversy raging over whether the -.Tn DES -will still be secure -in a few years. -The advent of special-purpose hardware -could reduce the cost of any of the -methods of attack named above -so that they are no longer -computationally infeasible. -.Pp As the key or key schedule is stored in memory, the encryption can be -- cgit v1.2.3