From: nobody@REPLAY.COM (Anonymous)
To: cypherpunks@toad.com
Message Hash: fca3bbf2a4867fe3f99ff1bcff861b0b92a48e0b8c679c5c8f1883d804bb915e
Message ID: <199511300614.HAA08769@utopia.hacktic.nl>
Reply To: N/A
UTC Datetime: 1995-11-30 06:32:34 UTC
Raw Date: Thu, 30 Nov 1995 14:32:34 +0800
From: nobody@REPLAY.COM (Anonymous)
Date: Thu, 30 Nov 1995 14:32:34 +0800
To: cypherpunks@toad.com
Subject: Applied Cryptography Questions
Message-ID: <199511300614.HAA08769@utopia.hacktic.nl>
MIME-Version: 1.0
Content-Type: text/plain
A couple questions about Applied Cryptography (Second Edition)
1. What on earth is a Neural Net?
2. Consider the Chinese Lottery attack vs a processor bank.
ADVANTAGES
Distributed computing, no easy bombing target.
DISADVANTAGES
39% inefficient
Need specialized hardware [for speed] or transmission of alogrithms
for any specific alogrithm
Not on all the time
If value(crack) * cracks/chip > cost of chip, then why not have
the gov buy the chips? Its probably cheaper that way.
3. How does one cryptoanalyize a Feistel Network? I've read a bit
on this and it doesn't seem that the papers are consistant,
for example, one claims that 2^32 chosen plaintext is unreasonable
for a 64-bit block cipher whereas DES's cryptanalysis requires
something like 2^42.
4. Does there exist an n such that a keyspace of 2^n is trivial to crack
[ie a matter of miniutes] on a PC but is difficult to crack for a
big commercial company or even a major government? [this question
relates to Merkle's puzzles, when a 40-bit key seems a bit weak.]
5. Is there an errata yet?
Return to December 1995
Return to “nobody@REPLAY.COM (Anonymous)”