1995-08-22 - Re: DES & RC4-48 Challenges

Header Data

From: hallam@w3.org
To: dan@milliways.org (Dan Bailey)
Message Hash: af536dbf1398284a81bf4d4a4f849f552289d7be7d025b835d0fc67cc7e8f77a
Message ID: <9508220529.AA20429@zorch.w3.org>
Reply To: <199508220411.AA13217@ibm.net>
UTC Datetime: 1995-08-22 05:30:28 UTC
Raw Date: Mon, 21 Aug 95 22:30:28 PDT

Raw message

From: hallam@w3.org
Date: Mon, 21 Aug 95 22:30:28 PDT
To: dan@milliways.org (Dan Bailey)
Subject: Re: DES & RC4-48 Challenges
In-Reply-To: <199508220411.AA13217@ibm.net>
Message-ID: <9508220529.AA20429@zorch.w3.org>
MIME-Version: 1.0
Content-Type: text/plain



I don't think the differential Cryptanalysis attack helps very much. You
need a somewhat improbable quantity of chosen plaintext to attempt it.

You would get further with a direct attack I suspect. In any case lets do 
RC4-48 or RC4-44 first as proof of ability.


Another idea, lets crack CMDF, IBMs weakened key DES.

After DES the only other crack of interest thats in range is the meet in the 
middle attack on two key DES. Clipper looks a bit off in the distance still.
(We will get it one day, probably not until 2010 though).

I think we can probably do DES within two years.

	Phill




Thread