From: “Michael Froomkin - U.Miami School of Law” <froomkin@law.miami.edu>
To: Vin McLellan <vin@shore.net>
Message Hash: 8670aad9a2727eac4b81e174552b26755714c5cb9a9c527ace98bb695aedf85a
Message ID: <199702070441.UAA09108@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-07 04:41:06 UTC
Raw Date: Thu, 6 Feb 1997 20:41:06 -0800 (PST)
From: "Michael Froomkin - U.Miami School of Law" <froomkin@law.miami.edu>
Date: Thu, 6 Feb 1997 20:41:06 -0800 (PST)
To: Vin McLellan <vin@shore.net>
Subject: Re: 40-bit RC5 crack meaningless??
Message-ID: <199702070441.UAA09108@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
This would be the same Strassmann who stated in public at Harvard early in
1995 that most remailers were run by intelligence agencies such as the
KGB, then denied saying it when asked for substantiation? And cut it
from his paper?
On Thu, 6 Feb 1997, Vin McLellan wrote:
> Strassmann, the author of this denunciation of RSADS and
> Ian Goldberg, is the former Director of Defense Information
> (i.e., CIO,) of the Bush DoD and an often-insightful commentator
Having said that, there is some debate about the extent to which in
*intelligence gathering* as opposed to, say, trying to crack a banking
protocol, one can reasonably count on a known plaintext. And much debate
about the processing costs of not having one, especially when one doesn't
know what kind of document is being encrypted (e.g. is it ASCII plaintext?
a spreadsheet? a jpeg? etc.). I think that's his (misdirected) point.
A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law |
U. Miami School of Law | froomkin@law.miami.edu
P.O. Box 248087 | http://www.law.miami.edu/~froomkin
Coral Gables, FL 33124 USA | It's warm here.
Return to February 1997
Return to ““Michael Froomkin - U.Miami School of Law” <froomkin@law.miami.edu>”
1997-02-07 (Thu, 6 Feb 1997 20:41:06 -0800 (PST)) - Re: 40-bit RC5 crack meaningless?? - “Michael Froomkin - U.Miami School of Law” <froomkin@law.miami.edu>