From: Mike Duvos <enoch@zipcon.net>
To: cypherpunks@cyberpass.net
Message Hash: 3225f0f6dd01f9d5b9d592dba0d3937a2db17117d2ed05b00d8d7490ad3f9d88
Message ID: <199706182318.QAA29014@zipcon.net>
Reply To: <199706182110.OAA07864@goblin.punk.net>
UTC Datetime: 1997-06-18 23:28:10 UTC
Raw Date: Thu, 19 Jun 1997 07:28:10 +0800
From: Mike Duvos <enoch@zipcon.net>
Date: Thu, 19 Jun 1997 07:28:10 +0800
To: cypherpunks@cyberpass.net
Subject: Re: DESCHALL Press Release (fwd)
In-Reply-To: <199706182110.OAA07864@goblin.punk.net>
Message-ID: <199706182318.QAA29014@zipcon.net>
MIME-Version: 1.0
Content-Type: text/plain
> INTERNET-LINKED COMPUTERS CHALLENGE DATA ENCRYPTION STANDARD
[snip]
> At the time the winning key was reported to RSADSI, the DESCHALL effort
> had searched almost 25% of the total. At its peak over the recent
> weekend, the DESCHALL effort was testing 7 billion keys per second.
A quick question. Was finding the key by searching less than a quarter
of the keyspace just luck? Or did the DESCHALL folks exclude keyspace
already searched by competing efforts?
--
Mike Duvos $ PGP 2.6 Public Key available $
enoch@zipcon.com $ via Finger $
Return to June 1997
Return to “Robert Hettinga <rah@shipwright.com>”