[RC5] 40 bit encryption, and what about implementation
Scott Christopher Dodson
gsi22419 at gsaix2.cc.gasou.edu
Sat Mar 16 16:07:17 EST 2002
that's why a trusted third party is used. The keys are signed by a root
certification server, verisign, thawte, etc.
On Sat, 16 Mar 2002, Jeroen wrote:
> If i visit a website with 40 bit encryption, how do i know the site's key and how does the site mine?
> If there is a man in the middle attack, the key can be 2^40 bit long :-) but still insecure.
> To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
> rc5-digest subscribers replace rc5 with rc5-digest
To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest
More information about the rc5