From: m5@dev.tivoli.com (Mike McNally)
To: cypherpunks@toad.com
Message Hash: fb54546a1e58998b9e4ed2e06f29e7dcb9e04efde9944243026eedbc9184e5f4
Message ID: <9601302334.AA15942@alpha>
Reply To: N/A
UTC Datetime: 1996-02-01 01:09:31 UTC
Raw Date: Thu, 1 Feb 1996 09:09:31 +0800
From: m5@dev.tivoli.com (Mike McNally)
Date: Thu, 1 Feb 1996 09:09:31 +0800
To: cypherpunks@toad.com
Subject: re: alleged RC2
Message-ID: <9601302334.AA15942@alpha>
MIME-Version: 1.0
Content-Type: text/plain
Not like I have the time or anything, but is there any value in
attempting something like "bruterc2"?
(IANARC (I am not a real cryptographer), but it looks like one trick
to that would be to somehow short-circuit the key setup stage. I
suppose you could just start after it's mapped the user key into the
"xkey" array, but I might be missing something.)
______c_____________________________________________________________________
Mike M Nally * Tivoli Systems * Austin TX * I want more, I want more,
m5@tivoli.com * m101@io.com * I want more, I want more ...
<URL:http://www.io.com/~m101> *_______________________________
Return to February 1996
Return to “m5@dev.tivoli.com (Mike McNally)”
1996-02-01 (Thu, 1 Feb 1996 09:09:31 +0800) - re: alleged RC2 - m5@dev.tivoli.com (Mike McNally)