1994-05-30 - Re: Compress before encrypting? (Was Re: NSA Helped Yeltsin…)

Header Data

From: jpp@jpplap.markv.com (Jay Prime Positive)
To: cypherpunks@toad.com
Message Hash: da159535810adf6c4bc3feb17f157826119bc2095f5271fa0b81e8d80fda55a4
Message ID: <m0q88u3-0003paC@jpplap>
Reply To: <9405301653.aa25522@salmon.maths.tcd.ie>
UTC Datetime: 1994-05-30 16:06:17 UTC
Raw Date: Mon, 30 May 94 09:06:17 PDT

Raw message

From: jpp@jpplap.markv.com (Jay Prime Positive)
Date: Mon, 30 May 94 09:06:17 PDT
To: cypherpunks@toad.com
Subject: Re: Compress before encrypting? (Was Re: NSA Helped Yeltsin...)
In-Reply-To: <9405301653.aa25522@salmon.maths.tcd.ie>
Message-ID: <m0q88u3-0003paC@jpplap>
MIME-Version: 1.0
Content-Type: text/plain


   Date: Mon, 30 May 1994 16:53:32 +0200
   From: Alastair McKinstry <amck@maths.tcd.ie>
[...]
   While this is true, don't forget the usefulness of known plaintext
   for brute-force analyses. If you're doing a brute-force search
[...]
   Costs: <$20 million (see Schneier) and this then makes breaking DES
   keys (for example) trivial, if they all have the plain text.
[I presume Alastair ment to say] ...the same known plain text.
[...]

Ah yes.  Well, the state of the art in cryptanalysis (as far as I
know) just moved forward a notch. =)

j'





Thread