1997-02-02 - Re: “Strong” crypto and export rule changes.

Header Data

From: Adam Shostack <adam@homeport.org>
To: azur@netcom.com (Steve Schear)
Message Hash: f44e81ef443f72e74856ed0f7bd4b05cb46455cb4f11abe50a6b6c8476a7fd87
Message ID: <199702020455.XAA02857@homeport.org>
Reply To: <v02140b05af19b18d73ac@[10.0.2.15]>
UTC Datetime: 1997-02-02 04:59:53 UTC
Raw Date: Sat, 1 Feb 1997 20:59:53 -0800 (PST)

Raw message

From: Adam Shostack <adam@homeport.org>
Date: Sat, 1 Feb 1997 20:59:53 -0800 (PST)
To: azur@netcom.com (Steve Schear)
Subject: Re: "Strong" crypto and export rule changes.
In-Reply-To: <v02140b05af19b18d73ac@[10.0.2.15]>
Message-ID: <199702020455.XAA02857@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Steve Schear wrote:
| >        What the US government will allow to be exported is not "strong
| >encryption."  It is encryption only slightly too strong to be broken
| >by an amateur effort.  For the right investment in custom hardware, it
| >falls quickly.  (500,000 $US = 3.5 hour avg break).
| >
| 
| Considering Ian's feat you certainly seem to have had your crystal
| ball in hand.  

	I wear three around my neck.  Its a new age thing.

	More seriously, that estimate is the cost of breaking DES on
custom hardware, based on Wiener's figures.  Ian got RC4-40 in 3.5
hours on I don't know how much hardware, not a lot of it custom,
AFAIK.

Adam

-- 
Pet peeve of the day: Security companies whose protocols dare not
speak their name, because they don't have one. Guilty company of the
day is now V-One.








Thread