[1290] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Non-PK encryption not vulnerable via low key length?!

daemon@ATHENA.MIT.EDU (Adam Shostack)
Fri Mar 17 10:53:29 1995

From: Adam Shostack <adam@bwh.harvard.edu>
To: softtest@wu1.wl.aecl.ca (Software Test Account)
Date: Fri, 17 Mar 1995 08:24:37 -0500 (EST)
Cc: bugtraq@fc.net
In-Reply-To: <Pine.3.88.9503162241.A20020-0100000@wu1.wl.aecl.ca> from "Software Test Account" at Mar 16, 95 10:36:41 pm


| RC2 and RC4 are both public key systems -- then why wouldn't factoring 
| the key prove equally as (greatly more) effective as with attacks on 
| RSA/PGP. 
| 	 __pardon_my_misunderstanding__but__?
| 

No, rc2 and rc4 are secret key ciphers, which are sometimes used in
conjunction with public key systems.  The keys are hopefully random,
and not the product of two primes.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
						       -Hume

home help back first fref pref prev next nref lref last post