[8873] in cryptography@c2.net mail archive
Re: septillion operations per second
daemon@ATHENA.MIT.EDU (Ian Goldberg)
Thu Jun 21 14:05:46 2001
X-Envelope-To: cryptography@wasabisystems.com
To: cryptography@wasabisystems.com
From: iang@abraham.cs.berkeley.edu (Ian Goldberg)
Date: 21 Jun 2001 14:58:08 GMT
Message-ID: <9gt220$ji4$1@abraham.cs.berkeley.edu>
X-Complaints-To: news@abraham.cs.berkeley.edu
In article <200106202050.f5KKoqE10754@valis.black-ice.org>,
Mike Brodhead <mkb@black-ice.org> wrote:
>take a peek at the chapter on key lengths in Schneier's Applied
>Cryptography. it is an entertaining read. in short, he makes the
>case that computers as we understand them simply cannot conduct brute
>force attacks against 128-bit or larger semetric keys. (i won't
>repeat his explanation here.)
Actually, his explanation (which involves the energy required to erase
bits) isn't correct; look up "reversible computing", which is a way
to do computations at lower energy than the limit he proposes.
- Ian
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com