[11764] in cryptography@c2.net mail archive
Re: RSA's RC5-64 Secret Key Challenge has been solved.
daemon@ATHENA.MIT.EDU (John Gilmore)
Thu Sep 26 20:12:19 2002
To: "Trei, Peter" <ptrei@rsasecurity.com>, gnu@toad.com
Cc: "'cryptography@wasabisystems.com'" <cryptography@wasabisystems.com>
In-reply-to: <F504A8CEE925D411AF4A00508B8BE90A041BAE32@exna07.securitydynamics.com>
Date: Thu, 26 Sep 2002 14:45:12 -0700
From: John Gilmore <gnu@toad.com>
Congratulations to the team!
> I expect that this will be the last one attacked for
> a while - the next keylength is 72 bits, and at d.net's
> current rate, that would take them several centuries.
I think it's worth starting. Computers are getting exponentially
faster, so d.net's current rate will continue to increase. Humans
have little experience with long-drawn-out exponential processes, and
tend to underestimate their impact. They are pretty powerful
speeder-uppers at the tail end.
After getting that getting started, though, I suggest beginning a
brute-force attack on the GSM cellphone encryption algorithm. That's
in use in hundreds of millions of devices worldwide, protecting (or
failing to protect) the privacy of billions of phone calls a day.
John Gilmore
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com