[67309] in Cypherpunks
Re: DESCrack keyspace partitioning
daemon@ATHENA.MIT.EDU (Mike McNally)
Fri Oct 4 15:01:31 1996
Date: Fri, 04 Oct 1996 13:00:21 -0500
From: Mike McNally <m5@tivoli.com>
Reply-To: m5@tivoli.com
To: "geeman@best.com" <geeman@best.com>
Cc: "'cypherpunks@toad.com'" <cypherpunks@toad.com>
geeman@best.com wrote:
>
> Another thinking step: most real-world DES keys are derived from
> hashes. Not (P)RNGs.
Hashes? Hashes of what?
> The distributions are **not** uniform.
Then that's a wonderful weakness in the cryptosystem. Let's fix it.
> The goal is to search the most likely keys first, and
> not all keys are created equally.
Any cryptosystem for which one can compute likely vs. unlikely keys
has already been partially compromised.
______c_________________________________________________________________
Mike M Nally * IBM % Tivoli * Austin TX * How quickly we forget that
mailto:m5@tivoli.com mailto:m101@io.com * "deer processing" and "data
http://www.io.com/~m101/ * processing" are different!