From: “Joseph M. Reagle Jr.” <reagle@MIT.EDU>
To: dcsb@ai.mit.edu
Message Hash: 65fca56dd9cae7ef4ac84c9730a1c8ec88172335a24964f6f02ccbc84f6b7a62
Message ID: <9605272240.AA13168@rpcp.mit.edu>
Reply To: N/A
UTC Datetime: 1996-05-28 02:31:37 UTC
Raw Date: Tue, 28 May 1996 10:31:37 +0800
From: "Joseph M. Reagle Jr." <reagle@MIT.EDU>
Date: Tue, 28 May 1996 10:31:37 +0800
To: dcsb@ai.mit.edu
Subject: Re: CyberCash just did it!
Message-ID: <9605272240.AA13168@rpcp.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
At 12:08 AM 5/28/96 +0700, peng-chiew low wrote:
According to below, it looks like the session keys are single-DES, and they
are swapped using RSA... I'd think people would rather try cracking the DES
without bothering with the RSA -- be it 768 or 1024... (If the session key
is weak, it doesn't much matter what you send it in...)
>http://www.cybercash.com/cybercash/wp/bankwp.html#security
>
> " CyberCash transactions are protected by a powerful and sophisticated
> system of encryption, combining DES private-key and RSA public-key
> encryption technologies. In fact, CyberCash's 768-bit RSA key encryption
> capability is unique in that it is the most powerful encryption technology
> currently licensed by the United States government for export. CyberCash
> also has been approved by the government for 1024-bit RSA key encryption,
> and will be providing that technology by the end of 1996. "
_______________________
Regards, When we ask advice, we are usually looking for
an accomplice. -Marquis de la Grange
Joseph Reagle http://farnsworth.mit.edu/~reagle/home.html
reagle@mit.edu E0 D5 B2 05 B6 12 DA 65 BE 4D E3 C1 6A 66 25 4E
Return to May 1996
Return to ““Joseph M. Reagle Jr.” <reagle@MIT.EDU>”
1996-05-28 (Tue, 28 May 1996 10:31:37 +0800) - Re: CyberCash just did it! - “Joseph M. Reagle Jr.” <reagle@MIT.EDU>