From: Matt Thomlinson <phantom@u.washington.edu>
To: cypherpunks@toad.com
Message Hash: 370ca00f8b83ef30a2a73cc019997f6ba3182315811cef655f0d28be4213876a
Message ID: <Pine.3.89.9404222301.A16712-0100000@stein1.u.washington.edu>
Reply To: N/A
UTC Datetime: 1994-04-23 06:54:28 UTC
Raw Date: Fri, 22 Apr 94 23:54:28 PDT
From: Matt Thomlinson <phantom@u.washington.edu>
Date: Fri, 22 Apr 94 23:54:28 PDT
To: cypherpunks@toad.com
Subject: clipper/chosen plaintext attacks
Message-ID: <Pine.3.89.9404222301.A16712-0100000@stein1.u.washington.edu>
MIME-Version: 1.0
Content-Type: text/plain
even with plaintext/ciphertext pairs, it has been shown that hundreds of
millions of pairs are needed to determine anything about the key
involved (DES).
I'm sure some of the many responses to your post will include more
precise facts.
Matt Thomlinson
University of Washington, Seattle, Washington. phone: (206) 548-9804
Check my home page -- ftp://ftp.u.washington.edu/public/phantom/home.html
PGP 2.2 key available via email, or finger phantom@hardy.u.washington.edu
Return to April 1994
Return to “Matt Thomlinson <phantom@u.washington.edu>”
1994-04-23 (Fri, 22 Apr 94 23:54:28 PDT) - clipper/chosen plaintext attacks - Matt Thomlinson <phantom@u.washington.edu>