From: an41418@anon.penet.fi (wonderer)
To: cypherpunks@toad.com
Message Hash: b2797b45f6d719b1cd1ab73cc1e108c805fac51afe4b9fe255d85ce330092f8b
Message ID: <9310112312.AA12510@anon.penet.fi>
Reply To: N/A
UTC Datetime: 1993-10-11 23:16:23 UTC
Raw Date: Mon, 11 Oct 93 16:16:23 PDT
From: an41418@anon.penet.fi (wonderer)
Date: Mon, 11 Oct 93 16:16:23 PDT
To: cypherpunks@toad.com
Subject: Re: Breaking DES
Message-ID: <9310112312.AA12510@anon.penet.fi>
MIME-Version: 1.0
Content-Type: text/plain
I am sorry to have asked two questions in my original
post. A few people have made me aware of the reason
for encrypting EDE in triple DES for backward compatability
and the issue of whether or not DES is a group.
So, I'd like to redirect this thread to my other
question:
My understanding of how an exhaustive search on the key space
can be used to break DES is that for every key, K, D(K,Cipher)
is applied until the output matches something legible.
Say that some random string, to be thrown out, is added
to the beginning of the plain text, and that DES is applied
in cbc mode, then how could such an attack work?
My point, I don't see how DES can be broken if the initial
block is a grabage block, and cipher block chaining is used.
Please enlighten me (gently).
Wonderer
-------------------------------------------------------------------------
To find out more about the anon service, send mail to help@anon.penet.fi.
Due to the double-blind, any mail replies to this message will be anonymized,
and an anonymous id will be allocated automatically. You have been warned.
Please report any problems, inappropriate use etc. to admin@anon.penet.fi.
Return to October 1993
Return to “an41418@anon.penet.fi (wonderer)”
1993-10-11 (Mon, 11 Oct 93 16:16:23 PDT) - Re: Breaking DES - an41418@anon.penet.fi (wonderer)