[1294] in bugtraq
Re: Non-PK encryption not vulnerable via low key length?!
daemon@ATHENA.MIT.EDU (Allan Sutton)
Fri Mar 17 16:21:50 1995
Date: Fri, 17 Mar 1995 12:42:18 -0600 (CST)
From: Allan Sutton <asutton@tenagra.com>
To: Software Test Account <softtest@wu1.wl.aecl.ca>
Cc: "That Whispering Wolf..." <elfchief@lupine.org>,
Jonathan Cooper <entropy@IntNet.net>, vishy@sph.umich.edu,
bugtraq@fc.net
In-Reply-To: <Pine.3.88.9503162241.A20020-0100000@wu1.wl.aecl.ca>
On Thu, 16 Mar 1995, Software Test Account wrote:
>
> RC2 and RC4 are both public key systems -- then why wouldn't factoring
> the key prove equally as (greatly more) effective as with attacks on
> RSA/PGP.
This is the crux of the matter. RC2 and RC4 are _not_ public key systems.
They are conventional secret key algorithms, in the same class as DES or
IDEA.
Allan Sutton
asutton@tenagra.com