From: shamrock@netcom.com (Lucky Green)
To: cypherpunks@toad.com
Message Hash: cced1a1fe46253e06e5e69999586054e55e9ef968f1222fffaa7be5834cadcb2
Message ID: <v02120d08ae1e08e4deb7@[192.0.2.1]>
Reply To: N/A
UTC Datetime: 1996-07-26 12:13:20 UTC
Raw Date: Fri, 26 Jul 1996 20:13:20 +0800
From: shamrock@netcom.com (Lucky Green)
Date: Fri, 26 Jul 1996 20:13:20 +0800
To: cypherpunks@toad.com
Subject: Re: DES brute force? (was: Re: Borders *are* transparent)
Message-ID: <v02120d08ae1e08e4deb7@[192.0.2.1]>
MIME-Version: 1.0
Content-Type: text/plain
At 21:10 7/23/96, Mixmaster wrote:
>The problem with banking applications is that cracking a real key
>causes lots of real damage. I don't think it is illegal (as long
>as you don't withdraw somebody else's money), but publishing e.g.
>one of the DES keys used for the "EC Card" PIN verification would
>bring the European ATM system close to collapse. Finding a self-
>generated key, on the other hand, is not very impressive.
Keys can be changed. Sounds like a good target to me.
-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred.
Defeat the Demopublican Unity Party. Vote no on Clinton/Dole in November.
Vote Harry Browne for President.
Return to July 1996
Return to “shamrock@netcom.com (Lucky Green)”
1996-07-26 (Fri, 26 Jul 1996 20:13:20 +0800) - Re: DES brute force? (was: Re: Borders are transparent) - shamrock@netcom.com (Lucky Green)