1994-03-30 - Re: the rest of the key

Header Data

From: Graham Toal <gtoal@an-teallach.com>
To: cypherpunks@toad.com
Message Hash: 1855e30b23c2f0413a52dc311650711b2805b59142a63124ee30ab4238312bdb
Message ID: <199403302029.VAA22528@an-teallach.com>
Reply To: N/A
UTC Datetime: 1994-03-30 20:32:23 UTC
Raw Date: Wed, 30 Mar 94 12:32:23 PST

Raw message

From: Graham Toal <gtoal@an-teallach.com>
Date: Wed, 30 Mar 94 12:32:23 PST
To: cypherpunks@toad.com
Subject: Re: the rest of the key
Message-ID: <199403302029.VAA22528@an-teallach.com>
MIME-Version: 1.0
Content-Type: text/plain


	> I was just wondering.... If the NSA could get it's hands on half
	>(40) of any particular clipper key, wouldn't that just leave 2^40
	>to compute? Even with brute force, it's trivial  even next to DES.

	"half" is a a random number which is XOR'd with 80 bits.  Both halves
	look random.  The XOR of the two halves is not.

Oh yes, and the guy who is asking the spooks about the technical stuff -
be sure to find out where this 80-bit random number comes from and
where it goes when it's been used...  Anyone who knows the split-pattern
only needs to subvert *one* of the escrow agencies.

G






Thread