1996-07-26 - Re: Data Sources for DES Breaking

Header Data

From: daw@cs.berkeley.edu (David Wagner)
To: cypherpunks@toad.com
Message Hash: 901abf27463b3cf6c27a932f6483ec8b7a806627757dd51f227a8befa1989ea4
Message ID: <4t9t1u$iar@joseph.cs.berkeley.edu>
Reply To: <199607242051.NAA13352@netcom5.netcom.com>
UTC Datetime: 1996-07-26 11:01:59 UTC
Raw Date: Fri, 26 Jul 1996 19:01:59 +0800

Raw message

From: daw@cs.berkeley.edu (David Wagner)
Date: Fri, 26 Jul 1996 19:01:59 +0800
To: cypherpunks@toad.com
Subject: Re: Data Sources for DES Breaking
In-Reply-To: <199607242051.NAA13352@netcom5.netcom.com>
Message-ID: <4t9t1u$iar@joseph.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


In article <199607242051.NAA13352@netcom5.netcom.com>,
Mike Duvos <mpd@netcom.com> wrote:
> Given that we might embark upon this public demonstration of the
> fragility of single DES, what should we use for test data?

How about a Kerberos packet?

Kerberos is a time-honored system.  There are a number of citations
that can be provided to prove that it is in use (perhaps heavy use?)
on Wall Street.

Alternatively, how about a Netscape SSL packet encrypted with DES?

I will volunteer to provide such a challenge if anyone is going to
undertake a serious keysearch effort.





Thread