1996-03-07 - DoubleSpeak

Header Data

From: “A. Padgett Peterson P.E. Information Security” <PADGETT@hobbes.orl.mmc.com>
To: cypherpunks@toad.com
Message Hash: 36012ceaffd04e985ad7a491afed3910b275f987570851660e21e96331c068ef
Message ID: <960303190109.2020177f@hobbes.orl.mmc.com>
Reply To: N/A
UTC Datetime: 1996-03-07 23:22:42 UTC
Raw Date: Fri, 8 Mar 1996 07:22:42 +0800

Raw message

From: "A. Padgett Peterson P.E. Information Security" <PADGETT@hobbes.orl.mmc.com>
Date: Fri, 8 Mar 1996 07:22:42 +0800
To: cypherpunks@toad.com
Subject: DoubleSpeak
Message-ID: <960303190109.2020177f@hobbes.orl.mmc.com>
MIME-Version: 1.0
Content-Type: text/plain


> In addition they
>mentioned that the NSA has successfully developed systems to break
>encrypted messages below 1000 bit of key length and strongly suggested
>to use at least 1024 bit keys. They said that they semselves use 1024
>bit keys.

Is there anyone her who has *not* "developed systems to break encrypted
messages" ? One is called brute force and can run on any PC. The two 
pieces missing from the statement is the *cost* and *time* involved
in breaking keys of X length & would suspect the algorithm might have
something to do with the answer. (Can generate a LOASDR key of 1024 bits
real easily, breaks just as fast).

I use a PGP key of 1024 bits simply because I am too lazy to go to 2048
so why was this turkey posted twice ? Lacking meaningful parameters, it
does not really say anything.

						Warmly,
							Padgett





Thread