From: m5@vail.tivoli.com (Mike McNally)
To: ritter@cactus.org (Terry Ritter)
Message Hash: 0fa281808d5a448f625673c77b3ad2fdcf610d739c0deb5100352701761a5c1d
Message ID: <9402111359.AA09504@vail.tivoli.com>
Reply To: <9402110926.AA01707@cactus.org>
UTC Datetime: 1994-02-11 14:00:31 UTC
Raw Date: Fri, 11 Feb 94 06:00:31 PST
From: m5@vail.tivoli.com (Mike McNally)
Date: Fri, 11 Feb 94 06:00:31 PST
To: ritter@cactus.org (Terry Ritter)
Subject: Nx2 DES Found Weak
In-Reply-To: <9402110926.AA01707@cactus.org>
Message-ID: <9402111359.AA09504@vail.tivoli.com>
MIME-Version: 1.0
Content-Type: text/plain
Terry Ritter writes:
> Nx2 DES Found Weak
Isn't all of this in "Applied Cryptography"? Seems like Outerbridge
did something very much like this "AxB" stuff, and similarly it's
described how "Nx2" is vulnerable.
--
| GOOD TIME FOR MOVIE - GOING ||| Mike McNally <m5@tivoli.com> |
| TAKE TWA TO CAIRO. ||| Tivoli Systems, Austin, TX: |
| (actual fortune cookie) ||| "Like A Little Bit of Semi-Heaven" |
Return to February 1994
Return to “ritter@cactus.org (Terry Ritter)”