[508] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Key Scheduling vs. Ciphering -- A Hole In Modern

daemon@ATHENA.MIT.EDU (jamesd@echeque.com)
Sat Apr 5 14:40:40 1997

From: jamesd@echeque.com
Date: Sat, 05 Apr 1997 11:28:56 +0700
To: cryptography@c2.net

At 09:38 AM 2/15/97 -0800, Hal Finney wrote:
> This is an example of the point I was making above.  RC4's internal
> key table MUST be a permutation of 0..255.  Filling it with random
> bits will not work and will potentially produce a much weaker cipher.


I seem to recollect that it cannot be just any permutation either.  
The key setup routine is designed to avoid generating certain 
disastrous permutations.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd@echeque.com


home help back first fref pref prev next nref lref last post