1996-02-17 - Re: DES_ono

Header Data

From: Matt Blaze <mab@crypto.com>
To: tighe@spectrum.titan.com
Message Hash: be5777498871c0fffc3e40722ee80194d387e18ef09e53562d9440d1db0bd1f2
Message ID: <199602171829.NAA02360@crypto.com>
Reply To: <199602162252.QAA27785@softserv.tcst.com>
UTC Datetime: 1996-02-17 19:00:44 UTC
Raw Date: Sun, 18 Feb 1996 03:00:44 +0800

Raw message

From: Matt Blaze <mab@crypto.com>
Date: Sun, 18 Feb 1996 03:00:44 +0800
To: tighe@spectrum.titan.com
Subject: Re: DES_ono
In-Reply-To: <199602162252.QAA27785@softserv.tcst.com>
Message-ID: <199602171829.NAA02360@crypto.com>
MIME-Version: 1.0
Content-Type: text/plain


> John Young writes:
> 
> >   Citing the crypto-expert BSA study noted here by Matt
> >   Blaze, Computerworld of 2-12-96:
> 
> >   "Standard Encryption Vulnerable To Attack. Banking's most
> >   trusted technique for funds transfer questioned."
> 
> So the banker's finally figured out what the NSA told us 14 years ago?
> Great.

Actually, that article concludes that they *haven't* figured it out yet.

The report that the bankers haven't figured out yet, by the way,
is available online at:
  ftp://ftp.research.att.com/dist/mab/keylength.txt  [ASCII text]
or
  ftp://ftp.research.att.com/dist/mab/keylength.ps   [PostScript]

-matt






Thread