How secure SILC really is?
235 A: We have tried to make SILC as secure as possible. However, there is 236 no security protocol or security software that has not been vulnerable 237 to some sort of attacks. SILC is in no means different from this. So, 238 it is suspected that there are security holes in the SILC. These holes 239 just need to be found so that they can be fixed. SILC’s security 240 features has been developed from attacker’s point of view, and we’ve 241 tried to find all the possible attacks and guard the protocol against 242 them. 243 244 But to give you some parameters of security SILC uses the most secure 245 crytographic algorithms such as AES (Rijndael), Twofish, Blowfish, 246 RC5, etc. SILC does not have DES or 3DES as DES is insecure and 3DES 247 is just too slow. SILC also uses cryptographically strong random 248 number generator when it needs random numbers. Public key cryptography 249 uses RSA (PKCS #1) and Diffie-Hellman algorithms. Key lengths for 250 ciphers are initially set to 256. F
We have tried to make SILC as secure as possible. However, there is no security protocol or security software that has not been vulnerable to some sort of attacks. SILC is in no means different from this. So, it is suspected that there are security holes in the SILC. These holes just need to be found so that they can be fixed. SILC’s security features have been developed from attacker’s point of view, and we’ve tried to find all the possible attacks and guard the protocol against them. Please read the SILC Crypto FAQ for more detailed information.