1995-10-02 - Re: Cryptanalysis of RC4 - Preliminary Results (Repeat)

Header Data

From: “James A. Donald” <jamesd@echeque.com>
To: stewarts@ix.netcom.com (Bill Stewart)
Message Hash: 317e91333e0737f7953224e388fe450a0e447ad6dd3585967b761eb2e1189a34
Message ID: <199510020442.VAA14808@blob.best.net>
Reply To: N/A
UTC Datetime: 1995-10-02 04:42:30 UTC
Raw Date: Sun, 1 Oct 95 21:42:30 PDT

Raw message

From: "James A. Donald" <jamesd@echeque.com>
Date: Sun, 1 Oct 95 21:42:30 PDT
To: stewarts@ix.netcom.com (Bill Stewart)
Subject: Re: Cryptanalysis of RC4 - Preliminary Results (Repeat)
Message-ID: <199510020442.VAA14808@blob.best.net>
MIME-Version: 1.0
Content-Type: text/plain


At 06:39 AM 9/30/95 -0400, Dr. Frederick B. Cohen wrote:
>The problem is that if these keys are weak, there may be many others
>that are also weak.  In fact, by the time we explore all of the
>weaknesses, we may find the system is no longer very strong at all. 

These so called weak keys are far from weak.

You have a 1 in 64000 chance of reducing the search space by 64000.  
Big deal.

Use 128 bit session keys.

 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd@echeque.com






Thread