Bugtraq mailing list archives
Re: Non-PK encryption not vulnerable via low key length?!
From: jbb () cs umb edu (John B. Brown)
Date: Sat, 18 Mar 1995 01:30:16 -0500
Dear Folks,
From owner-bugtraq () fc net Fri Mar 17 06:42:18 1995 Date: Fri, 17 Mar 1995 12:42:18 -0600 (CST) From: Allan Sutton <asutton () tenagra com> To: Software Test Account <softtest () wu1 wl aecl ca>
On Thu, 16 Mar 1995, Software Test Account wrote:RC2 and RC4 are both public key systems -- then why wouldn't factoring the key prove equally as (greatly more) effective as with attacks on RSA/PGP.
This is the crux of the matter. RC2 and RC4 are _not_ public key systems. They are conventional secret key algorithms, in the same class as DES or IDEA.
Allan Sutton asutton () tenagra com
If they are in the same class as DES, then they are in BIG trouble! The $1M machine proposed by Michael J. Weiner in `Efficient DES Key Search' does in DES in 3.5 hours. according to the 'math'. Of course, anyone Big Brother wants to hear, he WILL hear. Shalom, JBB.
Current thread:
- Re: Non-PK encryption not vulnerable via low key length?!, (continued)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! sameer (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Software Test Account (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Jake Hill (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John B. Brown (Mar 17)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
- Re: GNU finger 1.37 executes ~/.fingerrc with gid root Christian Wettergren (Mar 20)
- cancel subscription Saeid Sadeghi (Mar 20)
- Re: Non-PK encryption not vulnerable via low key length?! Julian Assange (Mar 17)
- nfsbug leaving file systems mounted Dr. Frederick B. Cohen (Mar 18)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John B. Brown (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! Perry E. Metzger (Mar 18)