[rc5] 56 bits seem to be enough
webmaster at softimport.com
Thu Jun 5 02:20:57 EDT 1997
I am not quite sure, but I think that this 56Bit key, is not FULL for
the government, as far as I know is the NSA getting a certain amount
of the key (I think 10 % this would make around 6 Bit (The fist 6
Bit)), so this makes it much easier for them to crack.
> Date: Wed, 04 Jun 1997 16:04:14 +0000
> From: Dave Ashley <dash at netcom.com>
> To: rc5 at llamas.net
> Subject: [rc5] 56 bits seem to be enough
> Reply-to: rc5 at llamas.net
> It would seem the stats are holding at around 5.5 years to complete
> the 56 bit RSA crack. The whole point of the exercise was to prove
> to the government that 56 bit keys are not sufficient, and given the
> huge amount of distributed computing power already involved I'm of
> the opinion that instead you've managed to prove the opposite.
> At any rate, what does it matter? People can still use RSA with 64
> bit keys or more.
> What I wonder is if there is a better method of finding the key
> than exhaustive search--and that the government knows of this method
> and is keeping it secret. If they can do that what hope do we have,
> other than to create custom encryption methods for each task?
> Dave Ashley
> dash at netcom.com
> To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.
More information about the rc5