[1298] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Non-PK encryption not vulnerable via low key length?!

daemon@ATHENA.MIT.EDU (John B. Brown)
Sat Mar 18 02:26:10 1995

Date: Sat, 18 Mar 1995 01:30:16 -0500
From: "John B. Brown" <jbb@cs.umb.edu>
To: asutton@tenagra.com, softtest@wu1.wl.aecl.ca
Cc: bugtraq@fc.net

Dear Folks,

> From owner-bugtraq@fc.net Fri Mar 17 06:42:18 1995
> Date: Fri, 17 Mar 1995 12:42:18 -0600 (CST)
> From: Allan Sutton <asutton@tenagra.com>
> To: Software Test Account <softtest@wu1.wl.aecl.ca>

> On Thu, 16 Mar 1995, Software Test Account wrote:
> >
> > RC2 and RC4 are both public key systems -- then why wouldn't factoring 
> > the key prove equally as (greatly more) effective as with attacks on 
> > RSA/PGP. 

> This is the crux of the matter. RC2 and RC4 are _not_ public key systems. 
> They are conventional secret key algorithms, in the same class as DES or 
> IDEA.

> Allan Sutton
> asutton@tenagra.com


	If they are in the same class as DES, then they are in
BIG trouble! The $1M machine proposed by Michael J. Weiner in
`Efficient DES Key Search' does in DES in 3.5 hours. according
to the 'math'. Of course, anyone Big Brother wants to hear, he
WILL hear.

	Shalom,

	JBB.

home help back first fref pref prev next nref lref last post