Date: Wed, 18 Jun 1997 18:12:24 -0400 (EDT) From: Ben Black <black@zen.cypher.net> To: Jason Hudgins <hudginsj@smtp.dancooks.com> Cc: hackers@FreeBSD.ORG Subject: Re: RSA5 Encryption Cracked.. Message-ID: <Pine.LNX.3.91.970618181122.1835D-100000@zen.cypher.net> In-Reply-To: <11F12637A8E@smtp.dancooks.com>
next in thread | previous in thread | raw e-mail | index | archive | help
are you certain it was the 56-bit challenge? i don't think we went through 25% of the keyspace...and their announcement said that globally 50% of the keyspace was exhausted... On Wed, 18 Jun 1997, Jason Hudgins wrote: > Heya, > I just thought some of you might be happy to know that the > Deschall project just successfully cracked an RC5 encrypted message > with a 56 bit key. The really cool thing is that it was one of the > 1-2% machines that was running FreeBSD! The majority of the > machines hacking away cpu cylces were running windows and solaris. > They found the key after searching through only 25% of the > keyspace. Even though it was really just a matter of luck, I still > that it was pretty cool. > > Jason > > > Jason L. Hudgins > Dan Cook's Web Hacker Type Person > office email: hudginsj@smtp.dancooks.com > home email: jasonh@cei.net > http://www.dancooks.com/~jason >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.91.970618181122.1835D-100000>