1996-07-25 - Re: Data Sources for DES Breaking

Header Data

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: 890da4deb1e47514f0717ffc5fac9ddd8afb358e16a336142bd243b0bf9251de
Message ID: <RqPmRD5w165w@bwalk.dm.com>
Reply To: <199607242051.NAA13352@netcom5.netcom.com>
UTC Datetime: 1996-07-25 21:33:56 UTC
Raw Date: Fri, 26 Jul 1996 05:33:56 +0800

Raw message

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 26 Jul 1996 05:33:56 +0800
To: cypherpunks@toad.com
Subject: Re: Data Sources for DES Breaking
In-Reply-To: <199607242051.NAA13352@netcom5.netcom.com>
Message-ID: <RqPmRD5w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


mpd@netcom.com (Mike Duvos) writes:

> Given that we might embark upon this public demonstration of the
> fragility of single DES, what should we use for test data?

If the goal is to show that the 40bit key used in s/mime is totally insecure,
then one could take some short plaintext likely to occur there and compute
a lookup table, listing its encryption with all possible keys - and make it
available on the internet.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





Thread