[10180] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Horseman Number 3: Osama Used 40 bits

daemon@ATHENA.MIT.EDU (Nelson Minar)
Thu Jan 17 16:37:25 2002

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15431.15455.681196.973414@cabernet.nelson.monkey.org>
Date: Thu, 17 Jan 2002 13:04:31 -0800
From: Nelson Minar <nelson@monkey.org>
To: "R. A. Hettinga" <rahettinga@earthlink.net>
Cc: cryptography@wasabisystems.com
In-Reply-To: <p05100323b86cd6aafe25@[10.0.1.2]>

>They were protected with a 40-bit Data Encryption Standard (DES),
>according to the Independent report. This was the maximum strength
>encryption allowed for export by US law until March 2001.

If this report is true, then it's evidence that the previous US crypto
export policy works. In particular the default on Windows machines
used to be 40 bit, you had to go through extra hoops to generate 128
bit. If they'd used an OS with 128 bit keys, then maybe we wouldn't
have been able to read the files?

I still think export restrictions are a bad idea, but what does this
mean?

                                                     nelson@monkey.org
.       .      .     .    .   .  . . http://www.media.mit.edu/~nelson/



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post