From: Hal <hfinney@shell.portal.com>
To: cypherpunks@toad.com
Message Hash: 52304631b207334a00e0a68577389bd8c56446fec1913b7ea6cfa65ad47f55ea
Message ID: <199508112127.OAA06516@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1995-08-12 09:35:47 UTC
Raw Date: Sat, 12 Aug 95 02:35:47 PDT
From: Hal <hfinney@shell.portal.com>
Date: Sat, 12 Aug 95 02:35:47 PDT
To: cypherpunks@toad.com
Subject: Re: "S1" encryption system
Message-ID: <199508112127.OAA06516@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
From: Carl Ellison <cme@TIS.COM>
> Has it already been observed that the key scheduling repeats keys every
> 5 rounds?
There have been a couple of good messages on sci.crypt, one by Colin
Plumb and one by Thomas Jakobsen. The latter mentioned something similar
re key scheduling. I hadn't noticed it. Chalk up another apparent
weakness.
Hal
Return to August 1995
Return to “Hal <hfinney@shell.portal.com>”
1995-08-12 (Sat, 12 Aug 95 02:35:47 PDT) - Re: “S1” encryption system - Hal <hfinney@shell.portal.com>