From: Michael Handler <grendel@netaxs.com>
To: root <root@einstein.ssz.com>
Message Hash: bfa19038261572f877abe90ed636bbd6091717869f284a34331e9f0ff88f694a
Message ID: <Pine.SUN.3.91.950131232744.17881C-100000@unix3.netaxs.com>
Reply To: <199502010348.VAA00506@einstein.ssz.com>
UTC Datetime: 1995-02-01 04:31:13 UTC
Raw Date: Tue, 31 Jan 95 20:31:13 PST
From: Michael Handler <grendel@netaxs.com>
Date: Tue, 31 Jan 95 20:31:13 PST
To: root <root@einstein.ssz.com>
Subject: Re: VoicePGP cracked in 10 minutes?...
In-Reply-To: <199502010348.VAA00506@einstein.ssz.com>
Message-ID: <Pine.SUN.3.91.950131232744.17881C-100000@unix3.netaxs.com>
MIME-Version: 1.0
Content-Type: text/plain
On Tue, 31 Jan 1995, root wrote:
> I heard a rumor hear in Ctl. Tx. that the VoicePGP project was cracked in the
> last couple of days in approx. 10 minutes. Anyone have any info on this other
> than one of those wild rumors that occur?
Well, uh, yeah.
VoicePGP hasn't been completed yet, much less released. If it's
been cracked, that's very ... suprising.
VoicePGP uses Diffie-Hellman and 3DES with three independent
subkeys. If anyone has come up with an attack on D-H or 3DES that works
in ten minutes, I'd love to hear about it, as I'm sure the rest of you would.
Call Security was cracked by Don Coppersmith [if you don't know who
he is, shame on you: he led the IBM Lucifer/DES team] about a day after the
announcement on sci.crypt. Call Security != VoicePGP.
Michael
--
Michael Handler <grendel@netaxs.com>
Civil Liberty Through Complex Mathematics Philadelphia, PA
"Toi qui fais au proscrit ce regard calme et haut" -- Baudelaire * Skotoseme
PGP Key ID FC031321 Print: 9B DB 9A B0 1B 0D 56 DA 61 6A 57 AD B2 4C 7B AF
Return to February 1995
Return to “root <root@einstein.ssz.com>”