[8679] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Requesting feedback on patched RC4-variant

daemon@ATHENA.MIT.EDU (Matthijs van Duin)
Tue Apr 24 11:23:53 2001

Mime-Version: 1.0
Message-Id: <v04220803b70a4e226a1c@[194.134.44.75]>
Date: Mon, 23 Apr 2001 23:25:04 +0200
To: cryptography@wasabisystems.com
From: Matthijs van Duin <matthijs@cds.nl>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

>Remember that the signal is being send using DSSS (Direct sequence 
>spread spectrum, similar to CDMA digital phones) and the chances of 
>an attacker being able to change just one bit, or a targeted 
>selection of bits, in a message, is essentially zero.

Maybe a middle-man attack, when the base station and the client are 
almost out of range?



>But you think that CBC mode of a (non-sucky) block cipher is 
>adequate protection? Sigh.

I never suggested it was adequate. I was just wondering how much my 
changes influence the security of the algorithm, especially in 
relation to the bit-toggle problem.

  -xmath

PS I tried it today.. plain RC4 can excellently be executed manually 
(base 52 or 26, instead of 256) using a deck of cards :-)


Matthijs van Duin
- PGP Key: 0xB6205CCB   <finger://PGPkey_DH@hmvd.cds.nl> -
- FP: D73C 9EE3 5F6B E5D5 8E19  2CBE 4648 8C3E B620 5CCB -



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post