1995-12-11 - DES Cryptanalysis

Header Data

From: Kevin L Prigge <Kevin.L.Prigge-2@cis.umn.edu>
To: cypherpunks@toad.com
Message Hash: c946564e299635cef0ec06293dd27503e207d4eac9c3c5ca223c86b60aa869a5
Message ID: <30cc40ff3f57002@noc.cis.umn.edu>
Reply To: N/A
UTC Datetime: 1995-12-11 21:23:52 UTC
Raw Date: Tue, 12 Dec 1995 05:23:52 +0800

Raw message

From: Kevin L Prigge <Kevin.L.Prigge-2@cis.umn.edu>
Date: Tue, 12 Dec 1995 05:23:52 +0800
To: cypherpunks@toad.com
Subject: DES Cryptanalysis
Message-ID: <30cc40ff3f57002@noc.cis.umn.edu>
MIME-Version: 1.0
Content-Type: text/plain


I'm looking for pointers, or perhaps an explanation of the statement
I found in Applied Cryptography (section 9.6) where it implies
that if the IV is not unique in CFB mode, the cryptanalyst can recover the
plaintext.

The reason that this interests me is that I have a file, encrypted
with DES in CFB mode. I believe I know the first 8 bytes of plaintext
and I also know the IV used. While it'd be nice to decrypt this
file, I don't know that it'd be worth brute forcing the key, even if
the spare cycles to do it were available. Any pointers to any pertinant
information would be appreciated. Thanks. 


-- 
Kevin L. Prigge        |"A computer lets you make more mistakes faster 
UofM Central Computing | than any invention in human history--with the 
email: klp@umn.edu     | possible exceptions of handguns and tequila."
01001001110101100110001| - Mitch Ratcliffe





Thread