From: “John A. Limpert” <johnl@radix.net>
To: “cypherpunks@toad.com>
Message Hash: e9630bac1946075a9dad8bc94147d55df565b9d3a66e7d3b70a30809ed28e68b
Message ID: <01BA7FB7.8CF32E40@dialin36.annex1.radix.net>
Reply To: N/A
UTC Datetime: 1995-09-11 00:06:34 UTC
Raw Date: Sun, 10 Sep 95 17:06:34 PDT
From: "John A. Limpert" <johnl@radix.net>
Date: Sun, 10 Sep 95 17:06:34 PDT
To: "cypherpunks@toad.com>
Subject: RE: 64 bit crypto
Message-ID: <01BA7FB7.8CF32E40@dialin36.annex1.radix.net>
MIME-Version: 1.0
Content-Type: text/plain
Couldn't we modify RC4 easily to provide the same
security against brute-force attacks by just running the key-setup phase
65536 times instead of just once?
Why would the attacker need to run the key setup 65536 times?
Return to September 1995
Return to ““John A. Limpert” <johnl@radix.net>”
1995-09-11 (Sun, 10 Sep 95 17:06:34 PDT) - RE: 64 bit crypto - “John A. Limpert” <johnl@radix.net>