Jim C. Nasby
nasbjim at charlie.cns.iit.edu
Sat Jul 4 11:31:17 EDT 1998
I was assuming a brute force attack, yes. Honestly, I don't see distributed.net
creating a core for this competition. If you would like to create on, and it has a
resonable chance of beating the contest, then we might be able to incorporate it in
the v2 client. Of course once v3 is out, you'll be able to create cores to your
hearts content... :)
rc5 at amazing.ch wrote:
> Hi Jim
> On Jun 29 Jim C. Nasby (nasbjim at charlie.cns.iit.edu) wrote:
> > Well, if you look at their specs, they use a variable length 700-1200 bit
> > key. So, unless decrypting their stuff is at least some 400 times faster than
> > RC5-64, forget it.
> That is only valid if you imply a brute force attack...
> > Plus, I don't know if they give you any clue as to the
> > message content, like RSA does with their contests.
> The say, it's a ziped file, so it should contain a known header.
> Want to flirt? -> http://www.amazing.ch/
> Your CPU is bored -> http://rc5.amazing.ch/rc5/
> To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
> rc5-digest subscribers replace rc5 with rc5-digest
Jim C. Nasby (aka Decibel!) /^\
nasbjim at charlie.cns.iit.edu /___\
Freelance lighting designer and database developer / | \
Member: Triangle Fraternity, Sports Car Club of America /___|___\
Give your computer some brain-candy! http://www.distributed.net Team #1828
To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest
More information about the rc5