1997-01-29 - Re: Last nail for US crypto export policy?

Header Data

From: “Z.B.” <zachb@netcom.com>
To: stewarts@ix.netcom.com
Message Hash: 2c65ef4b59a4157e52f6a67de7aab500cfe69eb8ca0a98937b97c7ccc8c04461
Message ID: <Pine.3.89.9701282147.A1983-0100000@netcom21>
Reply To: <3.0.1.32.19970128190443.00625320@popd.ix.netcom.com>
UTC Datetime: 1997-01-29 05:49:39 UTC
Raw Date: Tue, 28 Jan 1997 21:49:39 -0800 (PST)

Raw message

From: "Z.B." <zachb@netcom.com>
Date: Tue, 28 Jan 1997 21:49:39 -0800 (PST)
To: stewarts@ix.netcom.com
Subject: Re: Last nail for US crypto export policy?
In-Reply-To: <3.0.1.32.19970128190443.00625320@popd.ix.netcom.com>
Message-ID: <Pine.3.89.9701282147.A1983-0100000@netcom21>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 28 Jan 1997 stewarts@ix.netcom.com wrote:
[snip]
> >EXPORTABLE CRYPTOGRAPHY TOTALLY INSECURE: CHALLENGE CIPHER BROKEN IMMEDIATELY
> >
> >January 28, 1997 - Ian Goldberg, a UC Berkeley graduate student, 
> >announced today that he had successfully cracked RSA Data Security 
> >Inc.'s 40-bit challenge cipher in just under 3.5 hours.
> ....
> >Goldberg used UC Berkeley's Network of Workstations (known as the NOW) 
> >to harness the computational resources of about 250 idle machines.  
> >This allowed him to test 100 billion possible "keys" per hour -- 
> 
Good grief...I just remembered that this challenge started today when I 
read this letter.  A question - how does DES differ from the RC5 cyphers 
that are also up for breaking?  Where can I find some software to use on 
these?  



Zach Babayco 

zachb@netcom.com <-------finger for PGP public key

If you need to know how to set up a mail filter or defend against 
emailbombs, send me a message with the words "get helpfile" (without the 
" marks) in the SUBJECT: header, *NOT THE BODY OF THE MESSAGE!*  I have 
several useful FAQs and documents available.









Thread