source: trunk/third/ssh/README.CIPHERS @ 11534

Revision 11534, 3.3 KB checked in by danw, 27 years ago (diff)
This commit was generated by cvs2svn to compensate for changes in r11533, which included commits to RCS files with non-trunk default branches.
RevLine 
[10563]1BLOWFISH
2========
3
4Bruce Schneier's block cipher that was designed to be a fast and free
5alternative to existing encryption algorithms. It is unpatented and
6license-free. SSH version uses a 128-bit key for Blowfish (the
7algorithm allows anything from 32 to 448 bits).
8
9Performance on a pentium machine is about 88% of "none" encryption.
10
11You can disable it by giving the --without-blowfish option to
12configure. It is ON by default.
13
14
15ARCFOUR
16=======
17
18Arcfour is a stream cipher that supports variable length keys (SSH
19uses it with 128 bit keys). Arcfour is compatible with the RC4 cipher
20(RC4 is a trademark of RSA Data Security). Arcfour is quite fast.
21
22There are some problems in the way arcfour is used in SSH 1.x. Because
23of this, it is disabled by default. Arcfour can be enabled by giving
24--with-arcfour to configure; however, this will introduce security
25problems if the attacker can perform active network-level attacks. The
26problems are fixed in SSH 2.x.
27
28Performance on a pentium machine is about 91% of "none" encryption.
29
30The SSH client automatically switches to blowfish, if arcfour is
31requested but not supported. This allows old scripts and config files
32to work even now that arcfour is disabled by default. A warning is
33printed when this happens.
34
35
36IDEA
37====
38
39A 128-bit block cipher. Faster than 3DES, but slower than Arcfour and
40Blowfish. The IDEA algorithm is patented in many countries, and the
41patent holder disallows commercial use (their definition of
42commercial use include connections from one corporation to another
43corporation).
44
45Performance on a pentium machine is about 64% of "none" encryption.
46
47You can disable IDEA by giving the --without-idea option to configure. It is
48ON by default.
49
50
51DES
52===
53
54A 56-bit block cipher. About three times faster than 3DES, but slower
55than Arcfour and Blowfish. The 56-bit key length is too small for real
56security, so you should not enable this unless it is crucial for you
57to support DES (e.g. due to company policy).
58
59Performance on a pentium machine is about 71% of "none" encryption.
60
61You can enable DES by giving the --with-des option to configure. It is OFF
62by default.
63
64
653DES
66====
67
68Three-key triple-DES (effective key length of about 112 bits) in inner
69CBC-mode. This is the default fall back cipher that is used if the
70client asks for a cipher that isn't supported by the server.
71
72RSA private key files are encrypted by 3DES by default. (Some older
73versions encrypted private key files with IDEA, and such key files may
74still be around.)
75
76Performance on a pentium machine is about 45% of "none" encryption.
77
78You cannot disable it, because the it is mandatory cipher.
79
80
81NONE
82====
83
84No encryption at all. This cipher is intended only for testing, and
85should not be enabled for normal use. Using no encryption makes SSH
86vulnerable to network-level attacks (such as connection hijacking).
87There are also more subtle ways to exploit using no encryption, and
88servers should not allow such connections at all except when testing
89the protocol.
90
91Using no encryption is used as the reference value for the performance
92results indicated for other algorithms (and is represented by the
93value 100%). Note that performance depends also on compression,
94processor types, network speed, etc.
95
96You can allow "none" encryption by giving the --with-none option to
97configure. Using no encryption is not allowed by default.
Note: See TracBrowser for help on using the repository browser.