1995-09-11 - RE: 64 bit crypto

Header Data

From: “John A. Limpert” <johnl@radix.net>
To: “cypherpunks@toad.com>
Message Hash: e9630bac1946075a9dad8bc94147d55df565b9d3a66e7d3b70a30809ed28e68b
Message ID: <01BA7FB7.8CF32E40@dialin36.annex1.radix.net>
Reply To: N/A
UTC Datetime: 1995-09-11 00:06:34 UTC
Raw Date: Sun, 10 Sep 95 17:06:34 PDT

Raw message

From: "John A. Limpert" <johnl@radix.net>
Date: Sun, 10 Sep 95 17:06:34 PDT
To: "cypherpunks@toad.com>
Subject: RE: 64 bit crypto
Message-ID: <01BA7FB7.8CF32E40@dialin36.annex1.radix.net>
MIME-Version: 1.0
Content-Type: text/plain


Couldn't we modify RC4 easily to provide the same
security against brute-force attacks by just running the key-setup phase
65536 times instead of just once?

Why would the attacker need to run the key setup 65536 times?







Thread