From: Adam Back <aba@dcs.ex.ac.uk>
To: vin@shore.net
Message Hash: 45852d0d3e5a25d1a150d3950c36dc30e4a8cbb7593f1af9e3fe40679b8893b3
Message ID: <199706191843.TAA01322@server.test.net>
Reply To: <v03007803afcf197b5cfb@[198.115.179.81]>
UTC Datetime: 1997-06-20 11:16:21 UTC
Raw Date: Fri, 20 Jun 1997 19:16:21 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Fri, 20 Jun 1997 19:16:21 +0800
To: vin@shore.net
Subject: Re: Bullshit RE: HACKERS SMASH U.S. GOVERNMENT ENCRYPTION
In-Reply-To: <v03007803afcf197b5cfb@[198.115.179.81]>
Message-ID: <199706191843.TAA01322@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain
Vin McLellan <vin@shore.net> writes:
> Then Paul Bradley <paul@fatmans.demon.co.uk> the sage moderator of
> Cryptography.Uk stepped in:
>
> >Not only that, but single DES with a 56 bit key is just not being used
> >anymore in any company which has the slightest clue. If they can run a
> >distributed crack on 3DES with independent subkeys then I`ll give them
> >some attention.
>
> You've convinced me, the UK _is_ on a different planet!
Nah, it's just Paul :-)
Perhaps he should rephrase that to no one with a clue _should_ be
using single DES. Clearly lots are in practice, in spite of their
better judgement for political reasons. The US government influence
via their export controls being a major factor pushing the practice of
using too short key lengths.
What's cryptography.uk?
Adam
--
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to June 1997
Return to “Vin McLellan <vin@shore.net>”