[12492] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Columbia crypto box

daemon@ATHENA.MIT.EDU (Matthew Byng-Maddick)
Mon Feb 10 14:32:39 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Mon, 10 Feb 2003 15:56:53 +0000
From: Matthew Byng-Maddick <cryptography@lists.colondot.net>
To: Donald Eastlake 3rd <dee3@torque.pothole.com>
Cc: cryptography@wasabisystems.com
In-Reply-To: <Pine.LNX.4.44.0302092341290.16833-100000@netbusters.com>
Mail-Copies-To: never

On Sun, Feb 09, 2003 at 11:43:55PM -0500, Donald Eastlake 3rd wrote:
> been that you either throw away the first 256 bytes of stream key output 
> or use a different key on every message. WEP does neither. TKIP, the new 

You NEVER, EVER, re-use the key for a stream cipher, if you do, you might
as well just give up. By re-using the key, I can get
plaintext (combinator) plaintext, which is easier to solve than
plaintext (combinator) cipherstream.

It's one of those things, like re-using a pad.

MBM

-- 
Matthew Byng-Maddick         <mbm@colondot.net>           http://colondot.net/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post