[11764] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: RSA's RC5-64 Secret Key Challenge has been solved.

daemon@ATHENA.MIT.EDU (John Gilmore)
Thu Sep 26 20:12:19 2002

To: "Trei, Peter" <ptrei@rsasecurity.com>, gnu@toad.com
Cc: "'cryptography@wasabisystems.com'" <cryptography@wasabisystems.com>
In-reply-to: <F504A8CEE925D411AF4A00508B8BE90A041BAE32@exna07.securitydynamics.com> 
Date: Thu, 26 Sep 2002 14:45:12 -0700
From: John Gilmore <gnu@toad.com>

Congratulations to the team!

> I expect that this will be the last one attacked for 
> a while - the next keylength is 72 bits, and at d.net's 
> current rate, that would take them several centuries.

I think it's worth starting.  Computers are getting exponentially
faster, so d.net's current rate will continue to increase.  Humans
have little experience with long-drawn-out exponential processes, and
tend to underestimate their impact.  They are pretty powerful
speeder-uppers at the tail end.

After getting that getting started, though, I suggest beginning a
brute-force attack on the GSM cellphone encryption algorithm.  That's
in use in hundreds of millions of devices worldwide, protecting (or
failing to protect) the privacy of billions of phone calls a day.

	John Gilmore

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post