[1305] in bugtraq
Re: Non-PK encryption not vulnerable via low key length?!
daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Sat Mar 18 13:16:01 1995
To: "John B. Brown" <jbb@cs.umb.edu>
Cc: bugtraq@fc.net
In-Reply-To: Your message of "Sat, 18 Mar 1995 01:30:16 EST."
<199503180630.AA16848@terminus.cs.umb.edu>
Reply-To: perry@imsi.com
Date: Sat, 18 Mar 1995 12:07:06 -0500
From: "Perry E. Metzger" <perry@imsi.com>
"John B. Brown" says:
> > This is the crux of the matter. RC2 and RC4 are _not_ public key systems.
> > They are conventional secret key algorithms, in the same class as DES or
> > IDEA.
>
> If they are in the same class as DES, then they are in
> BIG trouble! The $1M machine proposed by Michael J. Weiner in
> `Efficient DES Key Search' does in DES in 3.5 hours. according
> to the 'math'.
Saying that they are conventional cryptosystems like DES does not
imply that a the Weiner & Oorschot machine could be used against
them. In particuler, specialty DES hardware is useless against other
systems, but even more importantly, key length is (potentially) much
longer for RC2 and RC4, and every bit added to the key doubles the
time for a brute force attack.
.pm