[24448] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Time to exhaustively break 40-bit RC4?

daemon@ATHENA.MIT.EDU (Kipp E.B. Hickman)
Thu Dec 22 17:06:10 1994

From: "Kipp E.B. Hickman" <kipp@warp.mcom.com>
Date: Thu, 22 Dec 1994 13:45:57 -0800
In-Reply-To: Hal <hfinney@shell.portal.com>
        "Re: Time to exhaustively break 40-bit RC4?" (Dec 17,  1:49pm)
To: Hal <hfinney@shell.portal.com>, cypherpunks@toad.com

On Dec 17,  1:49pm, Hal wrote:
> Subject: Re: Time to exhaustively break 40-bit RC4?
> I notice in the Netscape SSL spec the 40-bit export-approved RC4
> key generation is a little more complicated than I would have thought.
> First a 128 bit "master key" is chosen and 88 bits are revealed, leaving
> 40 bits secret.  Then the RC4 session key is generated as the MD5 hash of
> this master key plus about 32 bytes of publically known but random
> information.  I'm not clear whether the 128-bit output of the MD5 hash is
> then used as the RC4 key, or whether only 40 bits are used (and if so,
> whether there are any public bits in the key besides these 40).

128 bits are used. I have cleaned up the spec language to make this more
obvious.

> If the former, then this extra hash step should really slow down
> exhaustive search of the key space.  If the latter, then it is not clear
> why the master key is key-size restricted at all since it is not likely
> to be used in searching the key space.  Maybe someone from Netscape could
> clear up how this is done.

Hopefully it will slow down exhaustive key search.

Hope this helps, and thanks again for the comments.


-- 
---------------------------------------------------------------------
Kipp E.B. Hickman          Netscape Communications Corp.
kipp@mcom.com              http://www.mcom.com/people/kipp/index.html



home help back first fref pref prev next nref lref last post