funsec mailing list archives

Re: Hey old people


From: Aviram Jenik <aviram () beyondsecurity com>
Date: Tue, 27 Dec 2005 16:58:24 +0200

On Sunday, 25 December 2005 21:04, Drsolly wrote:
Can crypto weaknesses be considered 'vulnerabilities'? In most cases
(e.g. cracking the Enigma code and deciphering the Zimmerman telegram)
they are done by humintly retrieving the key or brute-forcing the cipher
in one way or another.

AFAIR breaking the Enigma consisted of:
A. Getting the actual hardware (without which the allies were completely 
clueless)
B. Performing a brute-force attack every morning to get that day's key

I believe the weakness in the design Roland mentioned allowed the brute force 
attack to succeed in a relatively short time - but it did not generate the 
key right away (Roland - am I right?)


In the case of Enigma, neither of those two were used.

Anyway, if these count, I nominate the breaking of the Caesar cipher :-P

I can't recollect this leading to any significant disaster.

Is that a prerequisite?

- Aviram
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: