[RC5] Cracking 40 bits in realtime

gindrup at okway.okstate.edu gindrup at okway.okstate.edu
Tue Jan 6 11:17:21 EST 1998


     It would (theoretically) be good enough to just know the first eight 
     characters.  (Assuming that DES is sufficiently smooth, this would 
     make the probability of multiple candidate decryptions be 2^-24.)  
            -- Eric Gindrup ! gindrup at okway.okstate.edu


______________________________ Reply Separator _________________________________
Subject: Re: [RC5] Cracking 40 bits in realtime 
Author:  <rc5 at llamas.net > at SMTP
Date:    1/3/98 9:52 AM


[snip]
     
        There's no difference in this and the RSA contests except it's a
smaller key length and anyone, not just RSA can have their contest. 
Create a message, encrypt it, tell us the first 30 characters, then we're 
off.  Just like RSA.
     [snip]


--
To unsubcribe, send 'unsubscribe rc5' to majordomo at llamas.net
rc5-digest subscribers replace rc5 with rc5-digest



More information about the rc5 mailing list