From: “James A. Donald” <jamesd@echeque.com>
To: stewarts@ix.netcom.com (Bill Stewart)
Message Hash: 317e91333e0737f7953224e388fe450a0e447ad6dd3585967b761eb2e1189a34
Message ID: <199510020442.VAA14808@blob.best.net>
Reply To: N/A
UTC Datetime: 1995-10-02 04:42:30 UTC
Raw Date: Sun, 1 Oct 95 21:42:30 PDT
From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 1 Oct 95 21:42:30 PDT
To: stewarts@ix.netcom.com (Bill Stewart)
Subject: Re: Cryptanalysis of RC4 - Preliminary Results (Repeat)
Message-ID: <199510020442.VAA14808@blob.best.net>
MIME-Version: 1.0
Content-Type: text/plain
At 06:39 AM 9/30/95 -0400, Dr. Frederick B. Cohen wrote:
>The problem is that if these keys are weak, there may be many others
>that are also weak. In fact, by the time we explore all of the
>weaknesses, we may find the system is no longer very strong at all.
These so called weak keys are far from weak.
You have a 1 in 64000 chance of reducing the search space by 64000.
Big deal.
Use 128 bit session keys.
---------------------------------------------------------------------
|
We have the right to defend ourselves | http://www.jim.com/jamesd/
and our property, because of the kind |
of animals that we are. True law | James A. Donald
derives from this right, not from the |
arbitrary power of the state. | jamesd@echeque.com
Return to October 1995
Return to ““James A. Donald” <jamesd@echeque.com>”
1995-10-02 (Sun, 1 Oct 95 21:42:30 PDT) - Re: Cryptanalysis of RC4 - Preliminary Results (Repeat) - “James A. Donald” <jamesd@echeque.com>