From: “Deranged Mutant” <WlkngOwl@unix.asb.com>
To: Hal <hfinney@shell.portal.com>
Message Hash: fbace09dd0c1729ad7908043e82c1df6d6c74f0fe344e7baa24542f6ac4bc849
Message ID: <199607181505.LAA17744@unix.asb.com>
Reply To: N/A
UTC Datetime: 1996-07-18 19:12:18 UTC
Raw Date: Fri, 19 Jul 1996 03:12:18 +0800
From: "Deranged Mutant" <WlkngOwl@unix.asb.com>
Date: Fri, 19 Jul 1996 03:12:18 +0800
To: Hal <hfinney@shell.portal.com>
Subject: Re: Crypto 96
Message-ID: <199607181505.LAA17744@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain
On 17 Jul 96 at 16:45, Hal wrote:
> Crypto 96 is coming up in about a month. This looks like a more
> interesting program than last year, IMO. According to the preliminary
[..]
> Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
> John Kelsey, Counterpane Systems, USA
> Bruce Schneier, Counterpane Systems, USA
> David Wagner, Univ. California at Berkeley, USA
>
> There are actually several cryptanalysis type papers for which
> I can't tell from the title whether they will be big new
> results or not. Anybody know what "key schedule" cryptanalysis
> is?
The way a key is transformed into a larger key or S-box. I assume
cryptanalysis of these means that there may be weaknesses which can
be exploited.
Rob
---
No-frills sig.
Befriend my mail filter by sending a message with the subject "send help"
Key-ID: 5D3F2E99 1996/04/22 wlkngowl@unix.asb.com (root@magneto)
AB1F4831 1993/05/10 Deranged Mutant <wlkngowl@unix.asb.com>
Send a message with the subject "send pgp-key" for a copy of my key.
Return to July 1996
Return to ““Deranged Mutant” <WlkngOwl@unix.asb.com>”
1996-07-18 (Fri, 19 Jul 1996 03:12:18 +0800) - Re: Crypto 96 - “Deranged Mutant” <WlkngOwl@unix.asb.com>