home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!newsgate.watson.ibm.com!yktnews!admin!wo0z!lwloen
- From: lwloen@rchland.vnet.ibm.com (Larry Loen)
- Subject: Re: DES, etc
- Sender: news@rchland.ibm.com
- Message-ID: <1992Dec31.192718.23152@rchland.ibm.com>
- Date: Thu, 31 Dec 1992 19:27:18 GMT
- Reply-To: lwloen@rchland.vnet.ibm.com
- Disclaimer: This posting represents the poster's views, not necessarily those of IBM
- References: <e2oNwB1w165w@west.darkside.com>
- Nntp-Posting-Host: wo0z.rchland.ibm.com
- Organization: IBM Rochester
- Lines: 17
-
- In article <e2oNwB1w165w@west.darkside.com>, sspy@west.darkside.com (mshannon) writes:
- |> Another question, gentlemen, if you would:
- (stuff deleted)
- |> When one says they "assume the spooks have been able to break the DES" is
- |> that assumed to be in CBC or only in ECB mode?
-
- As far as I recall, this is a theory versus practice issue. Breaking DES
- in ECB mode should also permit, in theory, CBC mode to be broken also.
- But, the attacks against ECB alone are slightly easier than the attacks
- against CBC mode.
-
- |>
- (rest of stuff deleted)
-
- --
- Larry W. Loen | My Opinions are decidedly my own, so please
- | do not attribute them to my employer
-