[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: encrypted email software



peter honeyman says:
> > still around about why it was changed from 64 bit to 56 bit,
> you mean 112 -> 56.  this has been resolved -- it seems that longer keys
> don't impose any additional complexity on des attacks.  although these
> attacks were discovered by the open crypto community only a few years ago,
> nsa had these techniques in hand long before.  the bottom line is that
> additional key bits would not make des more secure.  double des or triple
> des do.

Well, first - I believe DES was designed with 64 bit keys in mind,
and then due to some technical (unspecified :-) reasons he key was
shortened to 56 bits (and 56-bit version was submitted to NBS).

While longer key indeed offers little protection against attacks
like differential cryptanalysis - it's hard to argue that it can
blow brute-force attack out of the water...  And I'd be somewhat
more concerned about an adversary cracking my DES-encrypted mail
via brute force, than tapping my channel and collecting  2^45 of
plaintext-ciphertext pairs to deduce my  DES [randomly selected]
key (:-).

N'est pas?

> it has long been believed that a dedicated des-cracker is within the budget
> of extremely well financed organizations.

Well, of course a government (any government :-) could build such a
thing... After all, don't they get all those tax money? (:-)
--
Regards,
Uri         [email protected]      scifi!angmar!uri 	N2RIU
-----------
<Disclamer>