[8873] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: septillion operations per second

daemon@ATHENA.MIT.EDU (Ian Goldberg)
Thu Jun 21 14:05:46 2001

X-Envelope-To: cryptography@wasabisystems.com
To: cryptography@wasabisystems.com
From: iang@abraham.cs.berkeley.edu (Ian Goldberg)
Date: 21 Jun 2001 14:58:08 GMT
Message-ID: <9gt220$ji4$1@abraham.cs.berkeley.edu>
X-Complaints-To: news@abraham.cs.berkeley.edu

In article <200106202050.f5KKoqE10754@valis.black-ice.org>,
Mike Brodhead  <mkb@black-ice.org> wrote:
>take a peek at the chapter on key lengths in Schneier's Applied
>Cryptography.  it is an entertaining read.  in short, he makes the
>case that computers as we understand them simply cannot conduct brute
>force attacks against 128-bit or larger semetric keys.  (i won't
>repeat his explanation here.)

Actually, his explanation (which involves the energy required to erase
bits) isn't correct; look up "reversible computing", which is a way
to do computations at lower energy than the limit he proposes.

   - Ian



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post