1995-08-17 - Re: SSL challenge – broken !

Header Data

From: Andy Brown <asb@nexor.co.uk>
To: cypherpunks@toad.com
Message Hash: 96dadb7efc85a05ab30baf4a4be24458f9eabf61425feb615bd00e83faa698be
Message ID: <Pine.SOL.3.91.950817091924.25225B-100000@eagle.nexor.co.uk>
Reply To: <199508161745.KAA08481@jobe.shell.portal.com>
UTC Datetime: 1995-08-17 08:26:37 UTC
Raw Date: Thu, 17 Aug 95 01:26:37 PDT

Raw message

From: Andy Brown <asb@nexor.co.uk>
Date: Thu, 17 Aug 95 01:26:37 PDT
To: cypherpunks@toad.com
Subject: Re: SSL challenge -- broken !
In-Reply-To: <199508161745.KAA08481@jobe.shell.portal.com>
Message-ID: <Pine.SOL.3.91.950817091924.25225B-100000@eagle.nexor.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 16 Aug 1995, Hal wrote:
 
> Ironically, I understand that an independent effort coordinated by Adam
> Back also discovered the key at approximately the same time. In
> addition, Eric Young had done a search starting at 8000000000 and
> upwards; unfortunately the key value of 7ef0961fa6 was only about one
> percent below his starting point.  Hopefully Adam will supply more
> information.

Dave Byers found it with his MasPar while searching the space that Eric 
had left out.  The MasPar was getting 1.4M keys per second and hence 
could search the entire 40 bit keyspace in about 9 days anyway.


- Andy

+-------------------------------------------------------------------------+
| Andrew Brown  Internet <asb@nexor.co.uk>  Telephone +44 115 952 0585    |
| PGP (2048/9611055D): 69 AA EF 72 80 7A 63 3A  C0 1F 9F 66 64 02 4C 88   |
+-------------------------------------------------------------------------+





Thread