[1109] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: cracking n-DES?

daemon@ATHENA.MIT.EDU (Carl Ellison)
Fri Jun 27 23:43:59 1997

Date: Fri, 27 Jun 1997 23:22:31 -0400
To: Steve Bellovin <smb@research.att.com>
From: Carl Ellison <cme@cybercash.com>
Cc: cryptography@c2.net
In-Reply-To: <199706272331.TAA08744@smb.research.att.com>

-----BEGIN PGP SIGNED MESSAGE-----

There are several reasons I have advocated the combination

	des|tran|des|tran|des

if you want really serious multiple-DES.  Not only is the effective block 
size huge (fighting known plaintext fragment attacks) but any known 
headers from prior DES output blocks are lost in the noise.  Of course, 
people can use even dtdtd stupidly -- e.g., by using the same key for each 
instance of DES.

For those interested, tran is avbl in source off the end of my home page.

 - Carl

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM7SDZVQXJENzYr45AQFW8wP8Dohkdc+myoyogCr5MfcNuWrEePUZKVOX
DxPHuth66VqRgG1cR4XQEEHie/MTvnUEhm4OJapgtVOPKCxEArjzx4NPmUflQSbk
Hzk+mUGKoGS9yEg1kOAnLYjYLxhhPNrX1wXtecYLGasjfETlCK+cBY0sbzTmjxB2
6M7ORDj3qgA=
=uKEL
-----END PGP SIGNATURE-----


+------------------------------------------------------------------+
|Carl M. Ellison  cme@cybercash.com   http://www.clark.net/pub/cme |
|CyberCash, Inc.                      http://www.cybercash.com/    |
|207 Grindall Street   PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2 |
|Baltimore MD 21230-4103  T:(410) 727-4288  F:(410)727-4293        |
+------------------------------------------------------------------+


home help back first fref pref prev next nref lref last post