[67309] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: DESCrack keyspace partitioning

daemon@ATHENA.MIT.EDU (Mike McNally)
Fri Oct 4 15:01:31 1996

Date: Fri, 04 Oct 1996 13:00:21 -0500
From: Mike McNally <m5@tivoli.com>
Reply-To: m5@tivoli.com
To: "geeman@best.com" <geeman@best.com>
Cc: "'cypherpunks@toad.com'" <cypherpunks@toad.com>

geeman@best.com wrote:
> 
> Another thinking step: most real-world DES keys are derived from 
> hashes. Not (P)RNGs.

Hashes?  Hashes of what?

> The distributions are **not** uniform.

Then that's a wonderful weakness in the cryptosystem.  Let's fix it.

> The goal is to search the most likely keys first, and
> not all keys are created equally.

Any cryptosystem for which one can compute likely vs. unlikely keys
has already been partially compromised.

______c_________________________________________________________________
Mike M Nally * IBM % Tivoli * Austin TX  * How quickly we forget that
mailto:m5@tivoli.com mailto:m101@io.com  * "deer processing" and "data
http://www.io.com/~m101/                 * processing" are different!

home help back first fref pref prev next nref lref last post