From: Douglas Barnes <wixer!wixer.bga.com!gumby@cactus.org>
To: cypherpunks@toad.com
Message Hash: d8b6350458512da8e39b319920abfbe05c2cef44ebb12073d8730d792241bdfb
Message ID: <9304191559.AA19235@wixer>
Reply To: N/A
UTC Datetime: 1993-04-19 16:44:57 UTC
Raw Date: Mon, 19 Apr 93 09:44:57 PDT
From: Douglas Barnes <wixer!wixer.bga.com!gumby@cactus.org>
Date: Mon, 19 Apr 93 09:44:57 PDT
To: cypherpunks@toad.com
Subject: Wiretap Chip Questions
Message-ID: <9304191559.AA19235@wixer>
MIME-Version: 1.0
Content-Type: text/plain
I am working on articles and article proposals for some local media
outlets. I need to get some specific information regarding the
Clipper Chip (aka Wiretap Chip) proposal:
Questions:
1) What is a rough estimate of how long it would take a brute-force
attack on an 80-bit key using a parallel architecture
system costing less than, say, $25,000 two to three years from now.
2) How, in your opinion, would this affect the creation of international
standards for encryption? Would this help or hinder development of the
global economy?
3) I understand that the scheme relies on the secrecy of the encryption
algorithm to protect the transmission of keys at the beginning of
a session. (It uses a system key to encyrpt the keys for the two
devices). If the algorithm is successfully reverse-engineered,
does this compromise the entire system?
4) I am assuming that this system would be just as vulnerable to a "known
plaintext attack" as other schemes. Is this correct?
Please identify yourself and your credentials, and indicate whether or
not you wish to be quoted in any articles on this subject.
Thanks,
Douglas Barnes
gumby@wixer.bga.com
Return to April 1993
Return to “Douglas Barnes <wixer!wixer.bga.com!gumby@cactus.org>”
1993-04-19 (Mon, 19 Apr 93 09:44:57 PDT) - Wiretap Chip Questions - Douglas Barnes <wixer!wixer.bga.com!gumby@cactus.org>