[RC5] 40 bit encryption, and what about implementation

Scott Christopher Dodson gsi22419 at gsaix2.cc.gasou.edu
Sat Mar 16 16:07:17 EST 2002


that's why a trusted third party is used.  The keys are signed by a root
certification server, verisign, thawte, etc.



On Sat, 16 Mar 2002, Jeroen wrote:

> If i visit a website with 40 bit encryption, how do i know the site's key and how does the site mine?
> If there is a man in the middle attack, the key can be 2^40 bit long :-) but still insecure.
> 
> 
> --
> To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
> rc5-digest subscribers replace rc5 with rc5-digest
> 
> 

--
To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest



More information about the rc5 mailing list