From: Phil Karn <karn@qualcomm.com>
To: koontzd@lrcs.loral.com
Message Hash: f7b248bc4dfd80733fd2c4cabc5af294b3afe8d486395e323d2f62366f186551
Message ID: <199406022259.PAA13315@servo.qualcomm.com>
Reply To: <9406022244.AA18607@io.lrcs.loral.com>
UTC Datetime: 1994-06-02 22:59:28 UTC
Raw Date: Thu, 2 Jun 94 15:59:28 PDT
From: Phil Karn <karn@qualcomm.com>
Date: Thu, 2 Jun 94 15:59:28 PDT
To: koontzd@lrcs.loral.com
Subject: Re: Black Eye for NSA, NIST, and Denning
In-Reply-To: <9406022244.AA18607@io.lrcs.loral.com>
Message-ID: <199406022259.PAA13315@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain
>Gee, now that mab@research.att.com (Matt Blaze), knows where to find
>the checksum, and by extension the unit id (Which shows up on labels
>in photos on the literature from Mykotronx) - providing a known plaintext,
>maybe someone will start working on the family key?
Matt's attack doesn't require knowing where the checksums and unit IDs
are in the LEAF. Nor does it provide any insight into cracking
Skipjack itself, which would be required to learn the family key. He
simply determined that the chip will accept 1 out of every 65,536
randomly chosen LEAFs, which is a large enough fraction to make a
brute force search for one quite practical -- especially since it only
need be done once.
Phil
Return to June 1994
Return to “Phil Karn <karn@qualcomm.com>”