Bugtraq mailing list archives
Re: Non-PK encryption not vulnerable via low key length?!
From: perry () imsi com (Perry E. Metzger)
Date: Thu, 16 Mar 1995 15:03:19 -0500
Software Test Account says:
Okay, let's see. 2^128 = 3.4e38. Suppose you can somehow try one billion keys per second. Then it will take you 3.4e29 seconds or about 1e22 years to try every possible key. A shorter length of time than it would take with a 1024 bit key, but I don't think I'd lose much sleep over it.There must be ways of forcing convergence. Brute force is tacky.
If you know a way to break IDEA or RC4 that is better than brute force, you'll be very famous when you publish the paper. Perry
Current thread:
- Re: Non-PK encryption not vulnerable via low key length?! der Mouse (Mar 16)
- <Possible follow-ups>
- Re: Non-PK encryption not vulnerable via low key length?! Software Test Account (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! Perry E. Metzger (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! Stan Barber (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! smb () research att com (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! sameer (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Software Test Account (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Jake Hill (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John B. Brown (Mar 17)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
- Re: GNU finger 1.37 executes ~/.fingerrc with gid root Christian Wettergren (Mar 20)
- cancel subscription Saeid Sadeghi (Mar 20)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)