From: daw@cs.berkeley.edu (David Wagner)
To: cypherpunks@toad.com
Message Hash: 901abf27463b3cf6c27a932f6483ec8b7a806627757dd51f227a8befa1989ea4
Message ID: <4t9t1u$iar@joseph.cs.berkeley.edu>
Reply To: <199607242051.NAA13352@netcom5.netcom.com>
UTC Datetime: 1996-07-26 11:01:59 UTC
Raw Date: Fri, 26 Jul 1996 19:01:59 +0800
From: daw@cs.berkeley.edu (David Wagner)
Date: Fri, 26 Jul 1996 19:01:59 +0800
To: cypherpunks@toad.com
Subject: Re: Data Sources for DES Breaking
In-Reply-To: <199607242051.NAA13352@netcom5.netcom.com>
Message-ID: <4t9t1u$iar@joseph.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
In article <199607242051.NAA13352@netcom5.netcom.com>,
Mike Duvos <mpd@netcom.com> wrote:
> Given that we might embark upon this public demonstration of the
> fragility of single DES, what should we use for test data?
How about a Kerberos packet?
Kerberos is a time-honored system. There are a number of citations
that can be provided to prove that it is in use (perhaps heavy use?)
on Wall Street.
Alternatively, how about a Netscape SSL packet encrypted with DES?
I will volunteer to provide such a challenge if anyone is going to
undertake a serious keysearch effort.
Return to July 1996
Return to “mpd@netcom.com (Mike Duvos)”