[rc5] Re: Aren't we missing the point. WAS: Getting a few more keys/se

Murray Stokely murray at cdrom.com
Thu Jul 24 10:54:28 EDT 1997

   The American NSA and the government agencies of countless other
countries around the world have computers that can do it all in
hardware.. What we can spend a year doing they can do in less than an
hour.  I've always been an advocate of 1024bit and higher encryption

On Thu, 24 Jul 1997, Paul Leskinen wrote:
% Speaking of missing the point (and I know I'm gonna' get flamed for this
% one...),  I thought the point of the whole effort was to "prove" that
% 56-bit encryption is not strong enough to be an international standard. It
% seems to me that we're kind of proving the opposite--here we have a fairly
% well-organized effort to crack the key, and it still takes 10,000 computers
% over a year (roughly) to check all the keys.  Once we have the key, what
% would we do with it?  Most systems that use encryption use a dynamic key
% exchange fairly often (no less than once a day).  If that's true, then what
% good is finding a key in a year, or even a month, if it can't be used for
% anything?

To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.

More information about the rc5 mailing list