From: Hal <hfinney@shell.portal.com>
To: cypherpunks@toad.com
Message Hash: a7a09ee8e227d454305f2d210ca4853cee01f095a0bd28f9cd65794dbe7e4ba3
Message ID: <199507131945.MAA02875@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1995-07-13 19:46:37 UTC
Raw Date: Thu, 13 Jul 95 12:46:37 PDT
From: Hal <hfinney@shell.portal.com>
Date: Thu, 13 Jul 95 12:46:37 PDT
To: cypherpunks@toad.com
Subject: Re: SSL RC4 challenge
Message-ID: <199507131945.MAA02875@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
From: Hal <hfinney@shell.portal.com>
> Here is a challenge to try breaking SSL using the default exportable
> encryption mode, 40-bit RC4.
> [...]
It has been pointed out to me that I made a mistake in my analysis of the
SSL packets. The MAC at the beginning of the encrypted packets is itself
RC4 encrypted. That means that the 17 bytes of known plaintext start 16
bytes into the stream, not at the beginning as I thought. This just
means that after key setup, RC4 has to be cycled 16 times before we start
comparing its output with the XOR of the known plaintext and ciphertext.
I'll produce a revision of my "challenge". If no other mistakes are
found I'll post it to sci.crypt.
Hal
Return to July 1995
Return to “Hal <hfinney@shell.portal.com>”
1995-07-13 (Thu, 13 Jul 95 12:46:37 PDT) - Re: SSL RC4 challenge - Hal <hfinney@shell.portal.com>