[1294] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Non-PK encryption not vulnerable via low key length?!

daemon@ATHENA.MIT.EDU (Allan Sutton)
Fri Mar 17 16:21:50 1995

Date: Fri, 17 Mar 1995 12:42:18 -0600 (CST)
From: Allan Sutton <asutton@tenagra.com>
To: Software Test Account <softtest@wu1.wl.aecl.ca>
Cc: "That Whispering Wolf..." <elfchief@lupine.org>,
        Jonathan Cooper <entropy@IntNet.net>, vishy@sph.umich.edu,
        bugtraq@fc.net
In-Reply-To: <Pine.3.88.9503162241.A20020-0100000@wu1.wl.aecl.ca>



On Thu, 16 Mar 1995, Software Test Account wrote:
>
> RC2 and RC4 are both public key systems -- then why wouldn't factoring 
> the key prove equally as (greatly more) effective as with attacks on 
> RSA/PGP. 

This is the crux of the matter. RC2 and RC4 are _not_ public key systems. 
They are conventional secret key algorithms, in the same class as DES or 
IDEA.

Allan Sutton
asutton@tenagra.com




home help back first fref pref prev next nref lref last post