From: Piete Brooks <Piete.Brooks@cl.cam.ac.uk>
To: Duncan Frissell <frissell@panix.com>
Message Hash: 529af92aaa11b2884dc3e4819f42a596444d76d302fea34bc76eae9f42f476db
Message ID: <“swan.cl.cam.:012510:951010200606”@cl.cam.ac.uk>
Reply To: <199510101920.PAA24628@panix.com>
UTC Datetime: 1995-10-10 20:07:35 UTC
Raw Date: Tue, 10 Oct 95 13:07:35 PDT
From: Piete Brooks <Piete.Brooks@cl.cam.ac.uk>
Date: Tue, 10 Oct 95 13:07:35 PDT
To: Duncan Frissell <frissell@panix.com>
Subject: Re: Hal's Third Challenge?
In-Reply-To: <199510101920.PAA24628@panix.com>
Message-ID: <"swan.cl.cam.:012510:951010200606"@cl.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain
> Any movement towards a third cracking session. I know poor Netscape seems
> like old hat but it might be good to do one more to establish a working
> server (if we have one).
Indeed -- with the time to crack down to a few seconds using cryptanalytic
instead of brute, and netscape moving to 128 bit, there seemed little point in
going for netscape again.
It seems that microsoft was the one to go for, as they too use 40 bit for
each session .... If someone can generate the CRACKing code and someone can
donate an example, I'd be DELIGHTED to arrange another BRUTE !
PS: any non US people willing to test my PGP "Multi Protocol fast lookup"
as per http://www.pgp.net/pgp/ ? I'd like to see how fast it is from
distant parts (at 0.3 - 0.6 s real time locally, network delays will
be significant ...)
Return to October 1995
Return to “sameer <sameer@c2.org>”