[508] in cryptography@c2.net mail archive
Re: Key Scheduling vs. Ciphering -- A Hole In Modern
daemon@ATHENA.MIT.EDU (jamesd@echeque.com)
Sat Apr 5 14:40:40 1997
From: jamesd@echeque.com
Date: Sat, 05 Apr 1997 11:28:56 +0700
To: cryptography@c2.net
At 09:38 AM 2/15/97 -0800, Hal Finney wrote:
> This is an example of the point I was making above. RC4's internal
> key table MUST be a permutation of 0..255. Filling it with random
> bits will not work and will potentially produce a much weaker cipher.
I seem to recollect that it cannot be just any permutation either.
The key setup routine is designed to avoid generating certain
disastrous permutations.
---------------------------------------------------------------------
|
We have the right to defend ourselves | http://www.jim.com/jamesd/
and our property, because of the kind |
of animals that we are. True law | James A. Donald
derives from this right, not from the |
arbitrary power of the state. | jamesd@echeque.com