[328] in Kerberos
key <-> key schedule.
daemon@TELECOM.MIT.EDU (Bill Sommerfeld)
Wed Feb 24 04:21:25 1988
From: Bill Sommerfeld <wesommer@ATHENA.MIT.EDU>
To: kerberos@ATHENA.MIT.EDU
From examining the key schedule algorithm, it appears to be relatively
trivial to invert; each of the 16 iterations through the DES algorithm
through just uses a different 48 bit subset of the 56 bit key. To
recreate the key from the key schedule is just a matter of going
through the key schedule putting the bits back where they came from,
followed by recreating the parity bits (which are not used by the
encryption algorithm).
- Bill