From: Lucky Green <shamrock@netcom.com>
To: Andreas Bogk <andreas@artcom.de>
Message Hash: d7fda241c7118c3cd261e35c49044226eba9d8c0ccaf9bc15096212d09404dca
Message ID: <Pine.3.89.9610180813.A16687-0100000@netcom9>
Reply To: <y8apw2gfyqr.fsf@hertie.artcom.de>
UTC Datetime: 1996-10-18 15:43:55 UTC
Raw Date: Fri, 18 Oct 1996 08:43:55 -0700 (PDT)
From: Lucky Green <shamrock@netcom.com>
Date: Fri, 18 Oct 1996 08:43:55 -0700 (PDT)
To: Andreas Bogk <andreas@artcom.de>
Subject: Re: DES cracker.
In-Reply-To: <y8apw2gfyqr.fsf@hertie.artcom.de>
Message-ID: <Pine.3.89.9610180813.A16687-0100000@netcom9>
MIME-Version: 1.0
Content-Type: text/plain
On 18 Oct 1996, Andreas Bogk wrote:
> The EC-Card system, the European standard for ATM cards, is based on
> DES. A single recovered key would suffice to calculate all PINs every
> current EC card, the number of which runs into the tens of millions.
We have a winner! This target is attractive for two reasons:
1. A single key cracked can compromise the entire system.
2. It is a non-US target. Once the key is cracked, the EC-Card system
would most likely move to 3DES. And the US seems to have no desire to
allow the export of 3DES.
--Lucky
Return to October 1996
Return to ““Timothy C. May” <tcmay@got.net>”