[1153] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Better DES challenge update

daemon@ATHENA.MIT.EDU (Andreas Bogk)
Wed Jul 2 17:13:10 1997

To: die@die.com
Cc: eli@gs160.sp.cs.cmu.edu, cryptography@c2.net, crisp@netcom.com
From: Andreas Bogk <andreas@artcom.de>
Date: 02 Jul 1997 04:47:51 +0200
In-Reply-To: Dave Emery's message of Mon, 30 Jun 1997 23:21:44 -0400 (EDT)

>>>>> "Dave" == Dave Emery <die@pig.die.com> writes:

    Dave> card with little added support overhead.  Most previous
    Dave> proposals presumed that additional tests would be done in
    Dave> software past the initial trial decryption of 8 bytes - this
    Dave> would require a lot of chip to chip communications and all
    Dave> the baggage in the form of wide busses and fast interchip
    Dave> communications that this would entail.

In the classic DES case, false hits won't happen very often. If you
target ATM machines, where you know only part of the plaintext (the
PIN), such additional tests on-chip were neccessary, of course.

Andreas

-- 
Get rid of C++ and yourself a Dylan compiler at legend.gwydion.cs.cmu.edu!




home help back first fref pref prev next nref lref last post