From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: Scott Brickner <sjb@austin.ibm.com>
Message Hash: 011cdef472f7ae566185c28768da8daad4625526a2d5b67aa0713ee4e617acf3
Message ID: <9508281537.AA00466@ch1d157nwk>
Reply To: N/A
UTC Datetime: 1995-08-28 15:38:45 UTC
Raw Date: Mon, 28 Aug 95 08:38:45 PDT
From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Mon, 28 Aug 95 08:38:45 PDT
To: Scott Brickner <sjb@austin.ibm.com>
Subject: Re: random coincidences
Message-ID: <9508281537.AA00466@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain
Scott Brickner writes:
> If NetScape uses such a PRNG to select 40bit keys for SSL, then
> the work to be done in brute-force search going on right now might
> be *significantly* reduced by knowing the planes on which the
> numbers lie. If the constants are particularly poor, there might
> be as little as ten or twelve bits of real key.
So who here knows 80x86 assembler, is handy with a debugger, and has a few
hours of spare time to figure out the PRNG?
andrew
Return to August 1995
Return to “Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>”
1995-08-28 (Mon, 28 Aug 95 08:38:45 PDT) - Re: random coincidences - Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>