1996-07-24 - Re: DES brute force? (was: Re: Borders are transparent)

Header Data

From: Mixmaster <mixmaster@remail.obscura.com>
To: aba@atlas.ex.ac.uk
Message Hash: be79a34f01451592d0c04792376b4d60942bffd5f5ec748cae6f0b7220f14d47
Message ID: <199607240410.VAA04257@sirius.infonex.com>
Reply To: N/A
UTC Datetime: 1996-07-24 10:46:34 UTC
Raw Date: Wed, 24 Jul 1996 18:46:34 +0800

Raw message

From: Mixmaster <mixmaster@remail.obscura.com>
Date: Wed, 24 Jul 1996 18:46:34 +0800
To: aba@atlas.ex.ac.uk
Subject: Re: DES brute force? (was: Re: Borders *are* transparent)
Message-ID: <199607240410.VAA04257@sirius.infonex.com>
MIME-Version: 1.0
Content-Type: text/plain


>What DES modes are used in typical banking situations?  (I am
>presuming a challenge involving a widely used banking funds transfer
>protocol would be a suitably juicy targets, based on a criteria of
>demonstrating the greatest financial risk).

The problem with banking applications is that cracking a real key
causes lots of real damage.  I don't think it is illegal (as long
as you don't withdraw somebody else's money), but publishing e.g.
one of the DES keys used for the "EC Card" PIN verification would
bring the European ATM system close to collapse.  Finding a self-
generated key, on the other hand, is not very impressive.





Thread