From owner-freebsd-hackers Wed Apr 16 12:17:14 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id MAA10877 for hackers-outgoing; Wed, 16 Apr 1997 12:17:14 -0700 (PDT) Received: from phaeton.artisoft.com (phaeton.Artisoft.COM [198.17.250.50]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id MAA10820 for ; Wed, 16 Apr 1997 12:17:08 -0700 (PDT) Received: (from terry@localhost) by phaeton.artisoft.com (8.6.11/8.6.9) id LAA27772; Wed, 16 Apr 1997 11:54:34 -0700 From: Terry Lambert Message-Id: <199704161854.LAA27772@phaeton.artisoft.com> Subject: Re: First place. To: jjwolf@bleeding.com (Justin Wolf) Date: Wed, 16 Apr 1997 11:54:34 -0700 (MST) Cc: cmcurtin@research.megasoft.com, falco@vex.net, rsacrack@vex.net, hackers@freebsd.org, deschall@gatekeeper.megasoft.com In-Reply-To: <01BC49F6.CCE56760@crimson> from "Justin Wolf" at Apr 15, 97 11:43:19 pm X-Mailer: ELM [version 2.4 PL24] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > You actually think that DES is too weak when it takes all the hackers > in the known unix world to stage an attempt which has been so far > unsuccessful? Hmm... different point of view I guess. > > -Justin Wolf (jjwolf@bleeding.com) Depends on whether you can take advantage of symmetry to reduce the size of the data set, burn the results onto CDROM's indexed by post encrypted intelligence data, and load them into a changer in wait for the data you want to crack. If you could, you'd have the holy secret decoder ring for DES. Does anyone know if the RSA Challenge is using symmetry around the roots of squares (applying the recently published hyperbolic factoring technique), or if they are just brute-forcing it? Regards, Terry Lambert terry@lambert.org --- Any opinions in this posting are my own and not those of my present or previous employers.