From: Matt Blaze <mab@crypto.com>
To: tighe@spectrum.titan.com
Message Hash: be5777498871c0fffc3e40722ee80194d387e18ef09e53562d9440d1db0bd1f2
Message ID: <199602171829.NAA02360@crypto.com>
Reply To: <199602162252.QAA27785@softserv.tcst.com>
UTC Datetime: 1996-02-17 19:00:44 UTC
Raw Date: Sun, 18 Feb 1996 03:00:44 +0800
From: Matt Blaze <mab@crypto.com>
Date: Sun, 18 Feb 1996 03:00:44 +0800
To: tighe@spectrum.titan.com
Subject: Re: DES_ono
In-Reply-To: <199602162252.QAA27785@softserv.tcst.com>
Message-ID: <199602171829.NAA02360@crypto.com>
MIME-Version: 1.0
Content-Type: text/plain
> John Young writes:
>
> > Citing the crypto-expert BSA study noted here by Matt
> > Blaze, Computerworld of 2-12-96:
>
> > "Standard Encryption Vulnerable To Attack. Banking's most
> > trusted technique for funds transfer questioned."
>
> So the banker's finally figured out what the NSA told us 14 years ago?
> Great.
Actually, that article concludes that they *haven't* figured it out yet.
The report that the bankers haven't figured out yet, by the way,
is available online at:
ftp://ftp.research.att.com/dist/mab/keylength.txt [ASCII text]
or
ftp://ftp.research.att.com/dist/mab/keylength.ps [PostScript]
-matt
Return to February 1996
Return to “Mike Tighe <tighe@spectrum.titan.com>”