Oh wow, I saw the acronym expansion "indirection, shift, accumulate, add, and count" and the "I" immediately prompted me to go and look at the source code, and yes, ISAAC uses part of its secret state to index into its secret state. Not what one would consider a safe design for a cryptographic algorithm in the last couple of decades!
And 2kbits of state is better than 20kbits of state but not so nice as 256 bits :-)
no subject
Date: 2023-06-22 15:19 (UTC)Oh wow, I saw the acronym expansion "indirection, shift, accumulate, add, and count" and the "I" immediately prompted me to go and look at the source code, and yes, ISAAC uses part of its secret state to index into its secret state. Not what one would consider a safe design for a cryptographic algorithm in the last couple of decades!
And 2kbits of state is better than 20kbits of state but not so nice as 256 bits :-)