From: Paul Bradley <paul@fatmans.demon.co.uk>
To: Peter Trei <trei@process.com>
Message Hash: 121ea60fa267396db0c5506d8552e5c7dbcb474d82537bae6ccb058737c8332e
Message ID: <Pine.LNX.3.91.970616184448.515B-100000@fatmans.demon.co.uk>
Reply To: <199706161546.IAA05715@toad.com>
UTC Datetime: 1997-06-17 16:22:19 UTC
Raw Date: Wed, 18 Jun 1997 00:22:19 +0800
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Wed, 18 Jun 1997 00:22:19 +0800
To: Peter Trei <trei@process.com>
Subject: Re: [DES] Anguilla surpasses US military in code breaking challe
In-Reply-To: <199706161546.IAA05715@toad.com>
Message-ID: <Pine.LNX.3.91.970616184448.515B-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
> They have not released their source code for independent
> evaluation. I for one would feel a lot more comfortable with
> DESChall if there was at least some outside review, even if
> no general release is made.
I do not keep up with the various DES challenge efforts: Did DESChall
ever give a reason for not releasing source code?
Has anyone tried reverse engineering the executable?
Does anyone have statistics on how quick deschall is as opposed to, for
example, Bryddes? If they haven`t released source code and it is
significantly faster it may be they have further key schedule
optimisations they do not wish to share.
Datacomms Technologies data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
Return to June 1997
Return to “Toto <toto@sk.sympatico.ca>”