From: “Reply to: hahn@lds.loral.com” <HAHN@lds.loral.com>
To: cypherpunks@toad.com
Message Hash: b72880f9e412b768fc70df8cb495d8f302449c0f6844fc69288d93a8f9937edc
Message ID: <930803161718.1285@lds.loral.com>
Reply To: N/A
UTC Datetime: 1993-08-03 20:17:52 UTC
Raw Date: Tue, 3 Aug 93 13:17:52 PDT
From: "Reply to: hahn@lds.loral.com" <HAHN@lds.loral.com>
Date: Tue, 3 Aug 93 13:17:52 PDT
To: cypherpunks@toad.com
Subject: PKZIP Encryption Been Compromised?
Message-ID: <930803161718.1285@lds.loral.com>
MIME-Version: 1.0
Content-Type: text/plain
A friend of mine tells me that the encryption feature of the PKZIP
compressor/archiver is vulnerable. I have been using it for
private material that is not to be passed to anybody else.
To what extent is this material vulnerable to attack, given
that the attacker has no examples of a plaintext/ciphertext pair
using my key. Also, to what extent is the vulnerability a function
of the key length?
Thanks in advance to anybody who can help me.
Karl
| (V) | "Tiger gotta hunt. Bird gotta fly.
| (^ (`> | Man gotta sit and wonder why, why, why.
| ((\\__/ ) | Tiger gotta sleep. Bird gotta land.
| (\\< ) der Nethahn | Man gotta tell himself he understand."
| \< ) |
| ( / | Kurt Vonnegut Jr.
| | |
| ^ |
Return to August 1993
Return to ““Reply to: hahn@lds.loral.com” <HAHN@lds.loral.com>”
1993-08-03 (Tue, 3 Aug 93 13:17:52 PDT) - PKZIP Encryption Been Compromised? - “Reply to: hahn@lds.loral.com” <HAHN@lds.loral.com>