From: “Sheedy, E.C.C.” <E.C.C.Sheedy@research.kpn.com>
To: “‘cypherpunks@Algebra.COM>
Message Hash: 75bf09d98a11122193f300168be7b5a8576b8259381f23a07941fa8857bcc222
Message ID: <l=NTG3-970725081806Z-9269@ntl11.research.kpn.com>
Reply To: N/A
UTC Datetime: 1997-07-25 07:24:34 UTC
Raw Date: Fri, 25 Jul 1997 15:24:34 +0800
From: "Sheedy, E.C.C." <E.C.C.Sheedy@research.kpn.com>
Date: Fri, 25 Jul 1997 15:24:34 +0800
To: "'cypherpunks@Algebra.COM>
Subject: encryption evaluater software
Message-ID: <l=NTG3-970725081806Z-9269@ntl11.research.kpn.com>
MIME-Version: 1.0
Content-Type: text/plain
>July 10, 1997
>
>----------
>
>
>Nikkei English News via Individual Inc. : (Nikkei Industrial Daily, July 8,
>1997)
>
>Mitsubishi Electric Corp. said it has developed a software program which
>can be used to evaluate the security of various symmetric-key encryption
>algorithms, where the sender and recipient share the same key.
>
>The program analyzes a given encryption technology and displays the amount
>of computing power required to deduce the key and decrypt the message.
>
>Secure and practical data encryption is a necessary technology for the
>popularization of electronic money and electronic commerce. Mitsubishi's
>program could end up becoming an index by which to objectively evaluate the
>many new symmetric-key encryption methods being developed.
>
>The software combines the differential decryption method developed by
>Israeli encryption expert Adi Shamir with Mitsubishi's proprietary linear
>decryption method. By attempting to deduce the key with simple
>approximations of the encryption algorithm, the program determines the
>minimal volume of computations needed to crack the code, and also shows how
>long the key should be in order to make decryption nearly impossible.
>Mitsubishi said it has also finished development of a software program
>which uncovers the key based on the pattern of random numbers generated in
>the course of encrypting a message.
>The next step for the company is to combine all three decryption methods
>into a comprehensive program for evaluation. Working with support from the
>Ministry of International Trade and Industry, the company hopes to finish
>and publicize its program by next spring, providing it free of charge to
>users. (More)
________________________________
kpn research E.C.C. Sheedy
n m m m m m
n________________________ Security & Card systems
P.O. Box 15000 Telephone +31
50 582 17 92
9700 CD Groningen Telefax +31 50 312 24
15
The Netherlands
e-mail e.c.c.sheedy@research.kpn.com
________________________________________________________________
Return to July 1997
Return to ““Sheedy, E.C.C.” <E.C.C.Sheedy@research.kpn.com>”
1997-07-25 (Fri, 25 Jul 1997 15:24:34 +0800) - encryption evaluater software - “Sheedy, E.C.C.” <E.C.C.Sheedy@research.kpn.com>