From: Jon Cooper <Jon.Cooper@Eng.Sun.COM>
To: cypherpunks@toad.com
Message Hash: 859145bf649ae64af75c80adfa8f0938e1db94fb7c1920a12b9fbc1a3e961422
Message ID: <libSDtMail.199802021328.23604.cooperj@shoki>
Reply To: N/A
UTC Datetime: 1998-02-02 22:15:24 UTC
Raw Date: Tue, 3 Feb 1998 06:15:24 +0800
From: Jon Cooper <Jon.Cooper@Eng.Sun.COM>
Date: Tue, 3 Feb 1998 06:15:24 +0800
To: cypherpunks@toad.com
Subject: distributed cryptographic attack demo
Message-ID: <libSDtMail.199802021328.23604.cooperj@shoki>
MIME-Version: 1.0
Content-Type: text/plain
hi,
i'm trying to do a demo of a distributed object technology and it seems
to me that many cryptographic attacks would be facilitated by our
approach.
do you have any ideas for what a neat distributed effort might be?
the ones i've thought of just don't seem too exciting:
* GNFS of RSA modulus
* attacking SSL
* brute-force RC5 attack
i'm looking for something that would be a sort of viscerally engaging
attack, something that will make people who aren't necessarily
number theorists or cryptographers take note.
any input would be helpful!
*jon
PS - note that I'm not on cypherpunks so a direct reply would be
most highly appreciated.
Return to February 1998
Return to “Jon Cooper <Jon.Cooper@Eng.Sun.COM>”