home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!math.fu-berlin.de!uni-paderborn.de!urmel.informatik.rwth-aachen.de!solaris.rz.tu-clausthal.de!helios.rz.tu-clausthal.de!injc
- From: injc@helios.rz.tu-clausthal.de (Joerg Czeranski)
- Subject: Re: Help
- Message-ID: <1992Dec28.163628.4212@solaris.rz.tu-clausthal.de>
- Sender: root@solaris.rz.tu-clausthal.de (Operator)
- Organization: Techn. Univ. Clausthal
- X-Newsreader: Tin 1.1 PL5
- References: <1992Dec28.140911.5250@bernina.ethz.ch>
- Date: Mon, 28 Dec 1992 16:36:28 GMT
- Lines: 35
-
- Germano Caronni (caronni@nessie.cs.id.ethz.ch) wrote:
- : Rivest(I am not sure about the name) has shown in a
- : recent paper, that he can reduce the complexity of breaking DES by diffe-
- : rential cryptanalysis from 56 bit keyspace to 47 (or was it 41?) bit key-
- : space. And I am sure, the NSA has constructed one of these machines, that
- : contain _many_ parallel working DES-chips...
- : Germano Caronni caronni@nessie.cs.id.ethz.ch
-
- Shamir held a talk near Brussels (Belgium) in spring 1992, where he
- explained, how to break DES using a chosen plaintext attack. You have to
- make your opponent encrypt 2^47 data blocks, while changing his key at most
- every 8192 encryptions. Then you will break one of these keys with
- probability very close to 100%, and you will get the key just after
- it has been used, so chances are good, that it is still valid.
- The crucial point is that it is a chosen plaintext attack, thus unlikely
- being of any practical value.
-
- Joerg
-
- --
- Joerg Czeranski EMail injc@sun.rz.tu-clausthal.de
- Osteroeder Strasse 55 SMTP injc@[139.174.1.3]
- W-3392 Clausthal-Zellerfeld Voice (at work) +49-5323-72-3896
- Germany Voice (at home) +49-5323-78858
-
- To verify PGP public key, finger injc@sun.rz.tu-clausthal.de, or email me.
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQA9Ais98rIAAAEBgJzQ7Bh3LCI0F8bpmnN3/G8Ip6KZrnhgyIr5cnBiuco3l1tk
- levnfI+isd6qK5oFKQAFEbQtSm9lcmcgQ3plcmFuc2tpIDxpbmpjQHN1bi5yei50
- dS1jbGF1c3RoYWwuZGU+
- =dZKc
- -----END PGP PUBLIC KEY BLOCK-----
-