1996-08-01 - Re: Cracking RC4/40 for massive wiretapps

Header Data

From: “Deranged Mutant” <WlkngOwl@unix.asb.com>
To: Bill Stewart <stewarts@ix.netcom.com>
Message Hash: a493528916ed08db044c37c2b83393a2fc46e54922291757f4dc1a2a484e3662
Message ID: <199608011151.HAA07754@unix.asb.com>
Reply To: N/A
UTC Datetime: 1996-08-01 14:34:17 UTC
Raw Date: Thu, 1 Aug 1996 22:34:17 +0800

Raw message

From: "Deranged Mutant" <WlkngOwl@unix.asb.com>
Date: Thu, 1 Aug 1996 22:34:17 +0800
To: Bill Stewart <stewarts@ix.netcom.com>
Subject: Re: Cracking RC4/40 for massive wiretapps
Message-ID: <199608011151.HAA07754@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain



Wait a minute: RC4 is an OFB cipher.  The previous plaintext has no 
effect on the ciphertext.  Hence, an attacker with shitloads of 
storage capacity can generate some initial output for each key and 
test each pre-stored key against ciphertext for possible hits.  Using 
'flaws' in the key schedule (esp. if the key is based on a password 
rather than a hash of a password) one could search for 'more likely 
keys' first.

Rob
---
No-frills sig. Befriend my mail filter by sending a message with the subject "send help"
Key-ID: 5D3F2E99 1996/04/22 wlkngowl@unix.asb.com (root@magneto)
Send a message with the subject "send pgp-key" for a copy of my key.





Thread