Bugtraq mailing list archives
Re: Non-PK encryption not vulnerable via low key length?!
From: softtest () wu1 wl aecl ca (Software Test Account)
Date: Thu, 16 Mar 1995 12:00:42 -0600 (CST)
On Wed, 15 Mar 1995, Mark G. Scheuern wrote:
On Wed, 15 Mar 1995, Jonathan Cooper wrote:Date: Wed, 15 Mar 1995 20:35:44 -0500 (EST) From: Jonathan Cooper <entropy () IntNet net> To: Vishy Gopalakrishnan <vishy () sph umich edu> Cc: bugtraq () fc net Subject: Non-PK encryption not vulnerable via low key length?! You are wrong. If the key is only 128-bit, that's a much smaller keyspace to brute-force attack than a 1024-bit key. (do the math) -jonOkay, let's see. 2^128 = 3.4e38. Suppose you can somehow try one billion keys per second. Then it will take you 3.4e29 seconds or about 1e22 years to try every possible key. A shorter length of time than it would take with a 1024 bit key, but I don't think I'd lose much sleep over it. Mark
There must be ways of forcing convergence. Brute force is tacky.
Erik
____ _____ _______ __ Erik Lindquist
/ _ | / ___/ / _____/ / / Systems Administrator
/ /_| | / /__ / / / / AECL Whiteshell Laboratories
/ __ | / ___/ / / / / VOICE: (204) 753-2311x3145
/ / | | / /____ / /_____ / /_____ FAX: (204) 753-2455
/_/ |_| /______/ /_______/ /________/ E-mail: lindquie () wu1 wl aecl ca
Current thread:
- Re: Non-PK encryption not vulnerable via low key length?! der Mouse (Mar 16)
- <Possible follow-ups>
- Re: Non-PK encryption not vulnerable via low key length?! Software Test Account (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! Perry E. Metzger (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! Stan Barber (Mar 16)
- Re: Non-PK encryption not vulnerable via low key length?! smb () research att com (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! sameer (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Software Test Account (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! John F. Haugh II (Mar 25)
- Re: Non-PK encryption not vulnerable via low key length?! Jake Hill (Mar 17)
- Re: Non-PK encryption not vulnerable via low key length?! John B. Brown (Mar 17)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
- Re: GNU finger 1.37 executes ~/.fingerrc with gid root Christian Wettergren (Mar 20)
- GNU finger 1.37 executes ~/.fingerrc with gid root Thomas Roessler (Mar 17)
