Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 16 Apr 1997 08:05:50 -0700
From:      Justin Wolf <jjwolf@bleeding.com>
To:        "'drew@sml.co.jp'" <drew@sml.co.jp>, "'cmcurtin@research.megasoft.com'" <cmcurtin@research.megasoft.com>, Golan Klinger <falco@vex.net>, "rsacrack@vex.net" <rsacrack@vex.net>, "hackers@freebsd.org" <hackers@freebsd.org>, "deschall@gatekeeper.megasoft.com" <deschall@gatekeeper.megasoft.com>
Subject:   RE: First place.
Message-ID:  <01BC4A44.91B7BAA0@crimson>

next in thread | raw e-mail | index | archive | help
Key size, key size... 56-bits has to do with the key size.  DES can easily go to 112-bit triple which would be impossible to crack in any reasonable amount of time, even for the government.  At such time where 112-bit triple DES became crackable, people would start using something else anyway, like 224-bit quadruple DES or 1024-bit layered RSA or whatever.  There's nothing inherently wrong with DES, just the key size which is currently being allowed for export.  As far as symmetric algorithms go, it's pretty good.  And if you want to make it more difficult to crack use non-standard techniques within the algorithm (sure it's non-standard and there's a chance you'll break it, but someone would have to figure out that you changed the algorithm first).

Remember, chose an encryption technique that will protect the data as long as the data needs to be protected.  How many times do you think a secret that needs to be protected for eternity is sent over the internet or allowed outside of the two people (or person) involved?  It doesn't get emailed, it gets hand couriered.

I could go on but, it doesn't really matter anyway.  People have opinions which blind them into incoherency.

-Justin

-----Original Message-----
From:	drew@sml.co.jp [SMTP:drew@sml.co.jp]
Sent:	Wednesday, April 16, 1997 12:42 AM
To:	Justin Wolf; 'cmcurtin@research.megasoft.com'; Golan Klinger; rsacrack@vex.net; hackers@freebsd.org; deschall@gatekeeper.megasoft.com
Subject:	RE: First place.

>You actually think that DES is too weak when it takes all the 
>hackers in the known unix world to stage an attempt which has 
>been so far unsuccessful?  Hmm... different point of view I guess.

You actually think that the US government doesn't have at least ten
times the computing power of everyone in this effort put together?
Hell, they've probably got that much computing power just in people's
desktop workstations.  The fact is, 56-bit keys are useless when up 
against the US Government.
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?01BC4A44.91B7BAA0>