From: “David LANDGREN, PUB “ <David.D.L.LANDGREN@PUB.oecd.fr>
To: cypherpunks@toad.com
Message Hash: bdf0a99a947b66ad47a16fcb4ca9cce555a33bd6b9d350daff86af6aefbc69d4
Message ID: <“21031101903991/16267 OECDX400*“@MHS>
Reply To: N/A
UTC Datetime: 1993-09-10 10:37:38 UTC
Raw Date: Fri, 10 Sep 93 03:37:38 PDT
From: "David LANDGREN, PUB " <David.D.L.LANDGREN@PUB.oecd.fr>
Date: Fri, 10 Sep 93 03:37:38 PDT
To: cypherpunks@toad.com
Subject: ... long live DES (sic)
Message-ID: <"21031101903991/16267 OECDX400*"@MHS>
MIME-Version: 1.0
Content-Type: text/plain
>>>This chip takes a single plaintext/ciphertext pair and quickly tries
>>>DES keys until it finds one that produces the given ciphertext from the
>>>given plaintext.
It's all very well to be able to crack DES in 3.5 hours, but I don't know
of too many people who obligingly send out the plaintext and cyphertext of
a message together, or in some other way combinable. If U can get the
plaintext of a DES-encrypted msg then U don't need to dick around with DES
anyway. No-one ever said it was bulletproof; a direct consequence is that
DES users change their keys awful frequently.
David Landgren
<david.landgren@oecd.fr> <dlandgren@bix.com>
[standard disclaimer: this is my personal point of view]
A B O L I S H F E A R -- E S T A B L I S H T R U S T
Return to September 1993
Return to ““David LANDGREN, PUB “ <David.D.L.LANDGREN@PUB.oecd.fr>”
1993-09-10 (Fri, 10 Sep 93 03:37:38 PDT) - … long live DES (sic) - “David LANDGREN, PUB “ <David.D.L.LANDGREN@PUB.oecd.fr>