[rc5] rc5 crack schemes

James Knowles jknowles at pc034083.code3.com
Mon Aug 25 11:25:41 EDT 1997


-----BEGIN PGP SIGNED MESSAGE-----

At 11:53 AM 8/25/97 -0400, you wrote:
>how about a variation on brute-force?
>We shouldn't be doing a purely sequential scan, but using a bisection
>technique.

You do not change the odds of finding the right key.

>Also, there are some other schemes. The military uses a scheme which can
>crack a lesser generation 128-bit crypt in approx. 25 minutes. 
>[snip]
>I've heard that it uses some sort of neural net + fuzzy logic in
>determining key probabilities, and testing the keys that are calculated
>to have a high probability of being correct.

This sounds like mindless rumour. "The military" kind of tips it
off; reminds me of "military-grade" encryption being advertised. 
The NSA is the (US) government crypto gods. (Who are desperately
trying to undo Prometheus' "foul deed.")

If each key has an equal probability, how could this magic neural
net work?  

The only better way is if one could come up with a cryptanalytic 
attack that is less costly than brute force.

If there is substance to this rumour, then bring it to light so that
the world might be warmed and enlightened.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNAGyA2AWkwIwc6J9AQG3awf/STF3I/CZuZw4OCtlMkP++xtPRUV92d0V
B6yZi7Ev4eIAozzQ5cfEijOGsJrfcZHFVJ8ehzIH8GFoQJK5uW8IfTXppo18c1uk
RUroGO3inkKwx8IpmbEzJpOq0dhVn9f8UhSQO3fYoKaJ1Hk0Cf7IhmE//95p5Lpg
n0VPA/0fc3UI3OKx/EGCVkxdSH1PjR+f4zylRICIIU4fAbMSaBog8agaTkXG5RIQ
7MpcnElVxujaU4etBGFjijj6337v5AgtVkkyT8AH2gmhHXCnaVEr8sXKVFMUyb5I
+Z9QpYD/pcGyL4TR3tqIFuceM1Fu1QvICSvuJn98XTlwxCQkwY/nbw==
=BEW1
-----END PGP SIGNATURE-----

-------
Trust yourself. Trust Ivanova. Everybody else, shoot 'em!
- Susan Ivanova, Babylon 5

----
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.



More information about the rc5 mailing list