Sounds like a misunderstanding. You were the first one to mention public key cryptography in this thread. citizen's comments were directly concerning Junior89's algorithm.Quote:
Since the statements were about public key, I felt it appropriate to illuminate this fact when replying to a comment that changed the discussion from public key to private key in order to attempt to refute a statement made about public key crypto.
Please do not make such assumptions, unless you wish your own statements to be "beneath contempt" :pQuote:
While I provided a link to wikipedia to the original poster, that does not mean I advocate wikipedia as the supreme authority on all things crypto.
I did not use Wikipedia as an authority here, though I did use it as a reference to double check. Schneier's website on Blowfish claims: "Vincent Rijmen's Ph.D. thesis includes a second-order differential attack on 4-round Blowfish that cannot be extended to more rounds."
FIPS 197 states: "The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits."Quote:
Last I checked you get AES-512 on thumbdrive encryption utilities.
There is clearly no mention of 512 bit keys. I had the impression that primes are not needed for keys in symmetric ciphers.

