1996-07-24 - Re: Brute Force DES

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: The Deviant <deviant@pooh-corner.com>
Message Hash: 6c07cd88209c9691e5b9794f25c890abc4e73cbffd82c5407e5bf9b74858c7ce
Message ID: <199607241617.MAA18214@jekyll.piermont.com>
Reply To: <Pine.LNX.3.94.960724063243.1558B-100000@switch.sp.org>
UTC Datetime: 1996-07-24 20:22:06 UTC
Raw Date: Thu, 25 Jul 1996 04:22:06 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Thu, 25 Jul 1996 04:22:06 +0800
To: The Deviant <deviant@pooh-corner.com>
Subject: Re: Brute Force DES
In-Reply-To: <Pine.LNX.3.94.960724063243.1558B-100000@switch.sp.org>
Message-ID: <199607241617.MAA18214@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



The Deviant writes:
> Buy the point is to prove that DES shouldn't be used, not that it CAN
> be brute forced.  A known-plaintext attack doesn't show that.  We hafta
> attack something we've never seen. (i.e. talk Netscape, or some other
> company, into generating a DES'd message, and keeping the keys safe)

Known plaintext isn't needed. You just need a plaintext with some
decent statistical properties.

Dave Wagner has some information on this.

Perry





Thread