[1290] in bugtraq
Re: Non-PK encryption not vulnerable via low key length?!
daemon@ATHENA.MIT.EDU (Adam Shostack)
Fri Mar 17 10:53:29 1995
From: Adam Shostack <adam@bwh.harvard.edu>
To: softtest@wu1.wl.aecl.ca (Software Test Account)
Date: Fri, 17 Mar 1995 08:24:37 -0500 (EST)
Cc: bugtraq@fc.net
In-Reply-To: <Pine.3.88.9503162241.A20020-0100000@wu1.wl.aecl.ca> from "Software Test Account" at Mar 16, 95 10:36:41 pm
| RC2 and RC4 are both public key systems -- then why wouldn't factoring
| the key prove equally as (greatly more) effective as with attacks on
| RSA/PGP.
| __pardon_my_misunderstanding__but__?
|
No, rc2 and rc4 are secret key ciphers, which are sometimes used in
conjunction with public key systems. The keys are hopefully random,
and not the product of two primes.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume