1997-02-13 - Re: 40-bit RC5 crack meaningless??

Header Data

From: ca3sal@isis.sunderland.ac.uk (Stephen.George.Allport)
To: cypherpunks@toad.com
Message Hash: c9fcc583f843e369c376b4b4feeb36ddcf1d2bcfd490aa53ea7ec6e67e097b01
Message ID: <199702131442.OAA17335@cis525.cis.sund.ac.uk>
Reply To: N/A
UTC Datetime: 1997-02-13 14:43:05 UTC
Raw Date: Thu, 13 Feb 1997 06:43:05 -0800 (PST)

Raw message

From: ca3sal@isis.sunderland.ac.uk (Stephen.George.Allport)
Date: Thu, 13 Feb 1997 06:43:05 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: 40-bit RC5 crack meaningless??
Message-ID: <199702131442.OAA17335@cis525.cis.sund.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain


Strassmann wrote:
>In summary: The claim of exportable cryptography being totally
>insecure, because it can be cracked in 3.5 hours is not
>realistic. The three clues announced in the contest
>would not apply  under infowar conditions.

As the UK gets a lot of desktop PC software from the US, ie MS & Lotus
we unfouantly have to live with the 40-bit limit. What the RSA Chalange and 
Ian Goldberg have achived is a couple of aritcales in the broad sheet papers

http://www.telegraph.co.uk:80/et?ac=000145546611023&rtmo=33032622&atmo=33032622&
P4_FOLLOW_ON=/97/2/4/ecfilm04.html&pg=/et/97/2/4/ecfilm04.html

(ouch) and

http://go2.guardian.co.uk/archive.html

The competion has shown to the general populs and not just "experts" what a 
crap deal were getting. Three and half hours gets people thinking.

Ste 





Thread