[3397] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: German court: DES is no good

daemon@ATHENA.MIT.EDU (Matt Curtin)
Wed Sep 30 16:35:03 1998

To: Robert Hettinga <rah@shipwright.com>
Cc: cryptography@c2.net
From: Matt Curtin <cmcurtin@interhack.net>
Date: 30 Sep 1998 08:33:31 -0400
In-Reply-To: Robert Hettinga's message of "Thu, 24 Sep 1998 15:14:31 -0400"

Robert Hettinga <rah@shipwright.com> writes:

> The bank argued that the PIN can only be cracked with the use of the
> bank's own DES key, not with the information on the card - and
> assumed it would be impossible as there would be 70 billion
> different possibilities using the 56-bit algorithms."

Unfortunately, I didn't see any reference to the length of the PIN.

However, if it's as it is in the US, the number of possible PINS is
only 10^4, which is significantly more easy to brute-force than the
one of 2^56 possible DES keys used for generation of the PIN in the
first place.

The (lack of) strength of DES is completely irrelevant here.

-- 
Matt Curtin cmcurtin@interhack.net http://www.interhack.net/people/cmcurtin/

home help back first fref pref prev next nref lref last post