1997-01-07 - Relative Strength of 40-bit Crypto Implementations

Header Data

From: Vin McLellan <vin@shore.net>
To: cypherpunks@toad.com
Message Hash: e9e573220fba98a552862eb0c3396d922b37e209775ba2403e9f8ec6c5fab160
Message ID: <v03007800aef79ca2fd65@[206.243.166.164]>
Reply To: N/A
UTC Datetime: 1997-01-07 06:30:26 UTC
Raw Date: Mon, 6 Jan 1997 22:30:26 -0800 (PST)

Raw message

From: Vin McLellan <vin@shore.net>
Date: Mon, 6 Jan 1997 22:30:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Relative Strength of 40-bit Crypto Implementations
Message-ID: <v03007800aef79ca2fd65@[206.243.166.164]>
MIME-Version: 1.0
Content-Type: text/plain


	A client asked me today about where he could find evidence of the
relative strength of different encryption algorithms, when all are
restricted to 40-bit keys.  He assumed dot-Gov was going to restrict his
export product to the 40-bit limit, but he wanted to provide the strongest
security he could within that limitation.

	How should I have answered him?

         Vin McLellan + The Privacy Guild + <vin@shore.net>
      53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548







Thread