From: “Perry E. Metzger” <perry@piermont.com>
To: www-buyinfo@allegra.att.com
Message Hash: 584d04ef294da03f4fa1ec6d638959a57cce09e8ee634c28c7a20ec1524a9da7
Message ID: <199508171232.IAA02057@frankenstein.piermont.com>
Reply To: N/A
UTC Datetime: 1995-08-17 12:33:52 UTC
Raw Date: Thu, 17 Aug 95 05:33:52 PDT
From: "Perry E. Metzger" <perry@piermont.com>
Date: Thu, 17 Aug 95 05:33:52 PDT
To: www-buyinfo@allegra.att.com
Subject: Re: SSL challenge -- broken !
Message-ID: <199508171232.IAA02057@frankenstein.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
It has occured to me that, because the RC4 key crackers spend most of
their time in key setup, you can crack N SSL sessions that you
captured in not substantially more time than it took to crack 1. This
is analagous to the way brute force Unix password file hacking operates.
Perry
Return to August 1995
Return to ““Perry E. Metzger” <perry@piermont.com>”
1995-08-17 (Thu, 17 Aug 95 05:33:52 PDT) - Re: SSL challenge – broken ! - “Perry E. Metzger” <perry@piermont.com>