1993-09-10 - … long live DES (sic)

Header Data

From: “David LANDGREN, PUB “ <David.D.L.LANDGREN@PUB.oecd.fr>
To: cypherpunks@toad.com
Message Hash: bdf0a99a947b66ad47a16fcb4ca9cce555a33bd6b9d350daff86af6aefbc69d4
Message ID: <“21031101903991/16267 OECDX400*“@MHS>
Reply To: N/A
UTC Datetime: 1993-09-10 10:37:38 UTC
Raw Date: Fri, 10 Sep 93 03:37:38 PDT

Raw message

From: "David LANDGREN, PUB           " <David.D.L.LANDGREN@PUB.oecd.fr>
Date: Fri, 10 Sep 93 03:37:38 PDT
To: cypherpunks@toad.com
Subject: ... long live DES (sic)
Message-ID: <"21031101903991/16267 OECDX400*"@MHS>
MIME-Version: 1.0
Content-Type: text/plain


>>>This chip takes a single plaintext/ciphertext pair and quickly tries
>>>DES keys until it finds one that produces the given ciphertext from the
>>>given plaintext.

It's all very well to be able to crack DES in 3.5 hours, but I don't know
of too many people who obligingly send out the plaintext and cyphertext of
a message together, or in some other way combinable.  If U can get the
plaintext of a DES-encrypted msg then U don't need to dick around with DES
anyway.  No-one ever said it was bulletproof; a direct consequence is that
DES users change their keys awful frequently.

 David Landgren
 <david.landgren@oecd.fr>  <dlandgren@bix.com>
 [standard disclaimer: this is my personal point of view]

     A B O L I S H   F E A R   --   E S T A B L I S H   T R U S T








Thread