home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!pipex!bnr.co.uk!uknet!fulcrum!igb
- From: igb@fulcrum.co.uk (Ian G Batten)
- Newsgroups: sci.crypt
- Subject: Re: DES (Was: Re: 800MHz Trunked Radio System Signals)
- Message-ID: <C04nqu.wp@fulcrum.co.uk>
- Date: 31 Dec 92 14:18:30 GMT
- References: <1992Dec30.121120.736@uoft02.utoledo.edu> <1992Dec30.185029.23262@ulysses.att.com> <herman.725755696@phage>
- Sender: news@fulcrum.co.uk
- Organization: Fulcrum Communications
- Lines: 23
-
- In article <herman.725755696@phage> herman@nosc.mil (John W. Herman) writes:
- > DES is certainly good eough for any application that does not interest
- > a government. If a government is interested in decrypting any information
- > you have, you should consult a professional. I have no idea how you might
- > get in touch with one.
-
- It is likely that there are corporations whose computing facilities and
- staff skills are comparable to ``a government'' in this context. As a
- random example, given that (a) they developed it and (b) they have lots
- of computers, IBM are probably as capable as the average government of
- attacking DES.
-
- This says neither that IBM can attack DES, nor that, if they have the
- ability, that they have intention; merely that if attacks exist that
- governments can carry out, then there are corporation who are placed
- likewise.
-
- [[ If you do want to ship secure data around, and are worried about
- governments, generate a floppy disk full of random bits and convey a
- copy to your correspondent. XOR the shipped data and there you are.
- You now have a key management problem, but an encryption problem. ]]
-
- ian
-