[602] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: The unmentionable algorithm

daemon@ATHENA.MIT.EDU (jamesd@echeque.com)
Mon Apr 21 13:28:43 1997

From: jamesd@echeque.com
Date: Sun, 20 Apr 1997 08:04:18 +0800
To: Steven Bellovin <smb@research.att.com>
Cc: coderpunks@toad.com, cryptography@c2.net


James A. Donald
>	 So what.  Big deal.  People do not use symmetric keys twice.

At 08:16 AM 4/20/97 -0400, Steven Bellovin wrote:
> Keys are generally negotiated to protect *sessions*.  A session can be
> more than one message, in which case the encryption (often) starts anew for
> each message.  

In which case one continues the state of the RC4 permutation 
from where one left off.

Of course this adds complexity to the algorithm if we wish to 
handle message failure, but even with such added complexity 
(keeping copies of the RC4 permutation) RC4 is still substantially 
simpler since we have to keep copies of message state information
anyway.

The defects of RC, are remedied by simple measures, such as 
keeping a count and keeping a checksum, which one would 
ordinarily have to implement, though in different and
inequivalent ways, for other reasons anyway.

> First, if you're using an encrypted file system 

Agreed: Obviously RC4 is unsuitable for an encrypted file system.

However it is entirely suitable for an application such as PGP.

And none of the deficiencies of RC4 you have described are 
cryptographic weaknesses.  They are protocol requirements.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd@echeque.com


home help back first fref pref prev next nref lref last post