Bugtraq mailing list archives
Re: Non-PK encryption not vulnerable via low key length?!
From: proff () suburbia apana org au (Julian Assange)
Date: Sat, 18 Mar 1995 18:23:12 +1100 (EST)
Dear Jake, That was Michael J. Wiener of Bell Northern Research in 1993. The paper is 'Efficient DES Key Search'. His proposed machine would have cost about $1M and would have found a key in about 3.5 hours. Shalom, JBB.
Note that DES keyspace is 2^56, not 2^64, which would take 256 times as long to search (but still well within reach of major organizations). Cheers, Julian Assange (-Proff-)
Current thread:
- Re: Non-PK encryption not vulnerable via low key length?!, (continued)
- Re: Non-PK encryption not vulnerable via low key length?! Stan Barber (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! smb () research att com (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! sameer (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Software Test Account (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Jake Hill (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John B. Brown (Mar 17)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
- Re: GNU finger 1.37 executes ~/.fingerrc with gid root Christian Wettergren (Mar 20)
- cancel subscription Saeid Sadeghi (Mar 20)
- Re: Non-PK encryption not vulnerable via low key length?! Julian Assange (Mar 17)
- nfsbug leaving file systems mounted Dr. Frederick B. Cohen (Mar 18)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John B. Brown (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! Perry E. Metzger (Mar 18)