From: nobody@REPLAY.COM (Anonymous)
To: cypherpunks@toad.com
Message Hash: 961ab643cb53fd71fef6708c1691eca22825a0a685ebb882028bfb866301fe46
Message ID: <199606020009.CAA03429@basement.replay.com>
Reply To: N/A
UTC Datetime: 1996-06-02 02:58:32 UTC
Raw Date: Sun, 2 Jun 1996 10:58:32 +0800
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 2 Jun 1996 10:58:32 +0800
To: cypherpunks@toad.com
Subject: Hello there!Re: Where does your data want to go today?
Message-ID: <199606020009.CAA03429@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain
Someone who claimed to be David F. Ogren said on Sat, 1 Jun 1996:
> > The brute force system decrypts the first, and second blocks (8
> > bytes each) of the cyphertext, XORs them, and compares the result
> > with "PKZIP2.1". If the comparison is equal it has the key.
> I will concede that having a known header, such as a PKZIP header,
> does weaken a crypto to certain degree, but I still believe that it is
> not a significant problem. Here's why:
Why not simply use two session keys, and encrypt the headers with one
while encrypting the actual data with the other? That seems to solve both
problems, except that more CPU cycles are required.
Return to June 1996
Return to “nobody@REPLAY.COM (Anonymous)”