[RC5] Re: [HARDWARE] ongoing work
darxus at Op.Net
Tue Apr 27 22:54:34 EDT 1999
I'm sending this to the rc5 list, since it's not actually hardware
specific, and I figure some others may be interested....
On Tue, 27 Apr 1999, Robert Norton wrote:
> Still, I had an idea somewhat along those lines. If RC5 is a giant
> mix master of the bits, it does so by going along many steps of
> blending. If you could run backwards from the final one step, and
> still know some of the bits, say maybe 20 of the 64, then you could
> do a encoding pass up to just befoe the last step, and check only
> those 20 bits that are known.
Interesting. Since it's one way encryption, you can't actually decrypt
it, but I could definately believe there's a possibility that, going
backwards through the algorithm, you could generate some probabilities.
Figure out which keys would be most likely to be correct....
PGP fingerprint = 03 5B 9B A0 16 33 91 2F A5 77 BC EE 43 71 98 D4
darxus at op.net / http://www.op.net/~darxus
Pain makes you real.
To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest
More information about the rc5