From: Brad Huntting <huntting@glarp.com>
To: hkhenson@cup.portal.com
Message Hash: e965af2ed342cf8d8c7c3dc3e05d3ca380155ab13cfebbee5ce13b96e548ceb6
Message ID: <199302270134.AA07742@misc.glarp.com>
Reply To: <9302261100.2.21205@cup.portal.com>
UTC Datetime: 1993-02-27 01:36:21 UTC
Raw Date: Fri, 26 Feb 93 17:36:21 PST
From: Brad Huntting <huntting@glarp.com>
Date: Fri, 26 Feb 93 17:36:21 PST
To: hkhenson@cup.portal.com
Subject: Re: DES
In-Reply-To: <9302261100.2.21205@cup.portal.com>
Message-ID: <199302270134.AA07742@misc.glarp.com>
MIME-Version: 1.0
Content-Type: text/plain
> My take on breaking DES would be to just try all 2**56th keys on a
> massively parallel machine, though there may be better approaches.
A massively parallel colection of dedicated DES encryption hardware
might be more cost effective if had alot of these things to crack.
Speaking of which, does anyone know who makes "the DES chip" (is
there more than one?)? I'd like to find a data sheet for it.
brad
Return to February 1993
Return to “rubin@citi.umich.edu”