From: hallam@w3.org
To: dan@milliways.org (Dan Bailey)
Message Hash: af536dbf1398284a81bf4d4a4f849f552289d7be7d025b835d0fc67cc7e8f77a
Message ID: <9508220529.AA20429@zorch.w3.org>
Reply To: <199508220411.AA13217@ibm.net>
UTC Datetime: 1995-08-22 05:30:28 UTC
Raw Date: Mon, 21 Aug 95 22:30:28 PDT
From: hallam@w3.org
Date: Mon, 21 Aug 95 22:30:28 PDT
To: dan@milliways.org (Dan Bailey)
Subject: Re: DES & RC4-48 Challenges
In-Reply-To: <199508220411.AA13217@ibm.net>
Message-ID: <9508220529.AA20429@zorch.w3.org>
MIME-Version: 1.0
Content-Type: text/plain
I don't think the differential Cryptanalysis attack helps very much. You
need a somewhat improbable quantity of chosen plaintext to attempt it.
You would get further with a direct attack I suspect. In any case lets do
RC4-48 or RC4-44 first as proof of ability.
Another idea, lets crack CMDF, IBMs weakened key DES.
After DES the only other crack of interest thats in range is the meet in the
middle attack on two key DES. Clipper looks a bit off in the distance still.
(We will get it one day, probably not until 2010 though).
I think we can probably do DES within two years.
Phill
Return to August 1995
Return to “solman@MIT.EDU”