From: “Deranged Mutant” <WlkngOwl@unix.asb.com>
To: Bill Stewart <stewarts@ix.netcom.com>
Message Hash: a493528916ed08db044c37c2b83393a2fc46e54922291757f4dc1a2a484e3662
Message ID: <199608011151.HAA07754@unix.asb.com>
Reply To: N/A
UTC Datetime: 1996-08-01 14:34:17 UTC
Raw Date: Thu, 1 Aug 1996 22:34:17 +0800
From: "Deranged Mutant" <WlkngOwl@unix.asb.com>
Date: Thu, 1 Aug 1996 22:34:17 +0800
To: Bill Stewart <stewarts@ix.netcom.com>
Subject: Re: Cracking RC4/40 for massive wiretapps
Message-ID: <199608011151.HAA07754@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain
Wait a minute: RC4 is an OFB cipher. The previous plaintext has no
effect on the ciphertext. Hence, an attacker with shitloads of
storage capacity can generate some initial output for each key and
test each pre-stored key against ciphertext for possible hits. Using
'flaws' in the key schedule (esp. if the key is based on a password
rather than a hash of a password) one could search for 'more likely
keys' first.
Rob
---
No-frills sig. Befriend my mail filter by sending a message with the subject "send help"
Key-ID: 5D3F2E99 1996/04/22 wlkngowl@unix.asb.com (root@magneto)
Send a message with the subject "send pgp-key" for a copy of my key.
Return to August 1996
Return to “Hal <hfinney@shell.portal.com>”