1995-08-28 - Re: random coincidences

Header Data

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: Scott Brickner <sjb@austin.ibm.com>
Message Hash: 011cdef472f7ae566185c28768da8daad4625526a2d5b67aa0713ee4e617acf3
Message ID: <9508281537.AA00466@ch1d157nwk>
Reply To: N/A
UTC Datetime: 1995-08-28 15:38:45 UTC
Raw Date: Mon, 28 Aug 95 08:38:45 PDT

Raw message

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Mon, 28 Aug 95 08:38:45 PDT
To: Scott Brickner <sjb@austin.ibm.com>
Subject: Re: random coincidences
Message-ID: <9508281537.AA00466@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain


Scott Brickner writes:
>  If NetScape uses such a PRNG to select 40bit keys for SSL, then
>  the work to be done in brute-force search going on right now might
>  be *significantly* reduced by knowing the planes on which the
>  numbers lie.  If the constants are particularly poor, there might
>  be as little as ten or twelve bits of real key.

So who here knows 80x86 assembler, is handy with a debugger, and has a few  
hours of spare time to figure out the PRNG?


andrew





Thread