[rc5] 56 bits seem to be enough

Michael Kalus webmaster at softimport.com
Thu Jun 5 02:20:57 EDT 1997


I am not quite sure, but I think that this 56Bit key, is not FULL for 
the government, as far as I know is the NSA getting a certain amount 
of the key (I think 10 % this would make around 6 Bit (The fist 6 
Bit)), so this makes it much easier for them to crack.



> Date:          Wed, 04 Jun 1997 16:04:14 +0000
> From:          Dave Ashley <dash at netcom.com>
> To:            rc5 at llamas.net
> Subject:       [rc5] 56 bits seem to be enough
> Reply-to:      rc5 at llamas.net

> It would seem the stats are holding at around 5.5 years to complete
> the 56 bit RSA crack. The whole point of the exercise was to prove
> to the government that 56 bit keys are not sufficient, and given the
> huge amount of distributed computing power already involved I'm of
> the opinion that instead you've managed to prove the opposite.
> 
> At any rate, what does it matter? People can still use RSA with 64
> bit keys or more.
> 
> What I wonder is if there is a better method of finding the key
> than exhaustive search--and that the government knows of this method
> and is keeping it secret. If they can do that what hope do we have,
> other than to create custom encryption methods for each task?
> -- 	
> Dave Ashley
> dash at netcom.com
> http://www.geocities.com/TimesSquare/Arcade/4567
> ----
> To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.
> 
> 
----
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.



More information about the rc5 mailing list