[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Hello there!Re: Where does your data want to go today?
- To: [email protected]
- Subject: Hello there!
- Subject: Re: Where does your data want to go today?
- From: [email protected] (Anonymous)
- Date: Sun, 2 Jun 1996 02:09:43 +0200 (MET DST)
- Organization: Replay and Company UnLimited
- Sender: [email protected]
- XComm: Replay may or may not approve of the content of this posting
- XComm: Report misuse of this automated service to <[email protected]>
Someone who claimed to be David F. Ogren said on Sat, 1 Jun 1996:
> > The brute force system decrypts the first, and second blocks (8
> > bytes each) of the cyphertext, XORs them, and compares the result
> > with "PKZIP2.1". If the comparison is equal it has the key.
> I will concede that having a known header, such as a PKZIP header,
> does weaken a crypto to certain degree, but I still believe that it is
> not a significant problem. Here's why:
Why not simply use two session keys, and encrypt the headers with one
while encrypting the actual data with the other? That seems to solve both
problems, except that more CPU cycles are required.