1995-08-19 - Re: 64 bit keys breakable by the NSA or just some random key length?

Header Data

From: Chris Claborne <Chris.Claborne@SanDiegoCA.ATTGIS.COM>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: 0fffe41df88acb4d92eed505a6515351407f277f08e9a23cb16fb8a9794743c7
Message ID: <9508191730.aa02322@ncrhub1.ATTGIS.COM>
Reply To: N/A
UTC Datetime: 1995-08-19 21:31:12 UTC
Raw Date: Sat, 19 Aug 95 14:31:12 PDT

Raw message

From: Chris Claborne <Chris.Claborne@SanDiegoCA.ATTGIS.COM>
Date: Sat, 19 Aug 95 14:31:12 PDT
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: 64 bit keys breakable by the NSA or just some random key length?
Message-ID: <9508191730.aa02322@ncrhub1.ATTGIS.COM>
MIME-Version: 1.0
Content-Type: text/plain


At 12:51 PM 8/19/95 -0600, zinc wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>cpunks,
>
>i was thinking about the recent Clinton/LEA proposal regarding exportable 
>crypto.  the new rules would allow 64 bit keys to be exported, as long
>as the master key was made available through some key escrow service.
[good stuff deleted]

>since this *is* an escrow system, why didn't the gov't just go with
>the unbreakable 128 bit key length?  

   This is the kicker!  If what I heard is true, anyone can escrow the keys
under this new plan.  We know that the govt has no problem breaking it's one
rules by saying the magic words "matter of national security", so why don't
they require the keys be held by the govt?
   ... You know they can break it.   ...  I guess they assume the middle
american will buy it!  Just kills me.  

                                        ...  __o
                                       ..   -\<,
Chris.Claborne@SanDiegoCA.ATTGIS.Com   ...(*)/(*).          CI$: 76340.2422
http://bordeaux.sandiegoca.attgis.com/
PGP Pub Key fingerprint =  A8 FA 55 92 23 20 72 69  52 AB 64 CC C7 D9 4F CA
Avail on Pub Key server.
PGP-encrypted e-mail welcome!






Thread