[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Paranoid Musings



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 30 Jul 1996, Bill Frantz wrote:

> (1) Now everyone knows that 40 bit RC4 is weak, but just how weak is it? 
> We know that a university CS student can break one message in a week using
> the universities farm of workstations.  But, our foremost reputation agency
> for crypto strength, the ITAR, allows systems with RC4-40 to be exported. 
> What does this mean?
> 
> I combine the above with Whit Diffie's observation that, while crypto users
> are interested in the security of *each* message, organizations which
> monitor communications want to read *every* message.  A TLA interested in
> monitoring communications would need to crack RC4-40 much faster than
> 1/week.
> 
> Now expensive specialized cracking equipment can certainly speed up the
> process, but there may be a better way.  If cryptanalysis of RC4 yields
> techniques which make the process much easier, then it is the ideal cypher
> to certify for export.
> 
> The paranoid conclusion is that there is a significant weakness in RC4.

An FPGA can break RC4 in a few hours.  With several thousand of these, RC4
could be broken in about a second.  Besides, RC4 has been around for 9 years
and has not been successfully cryptanalyzed.  The RC4 algorithm is extremely
simple and doesn't have any obvious weaknesses.

- -- Mark

PGP encrypted mail prefered
Key fingerprint = d61734f2800486ae6f79bfeb70f95348
http://www.voicenet.com/~markm/  


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3
Charset: noconv

iQCVAwUBMf6RNLZc+sv5siulAQH/mQP9G+J/7BnV0AlvvPph032k9SnZ8/hCOqNp
aGV3WScE0FhCqtlmazDa8xopWWX1jSd2ZEhJLthQ0k70QUkKPD+gOteLr3075kan
vTLOr2l4pP9b0AP20Wclw/upZ04QWgfF/YrIcSTHgwcvuxBlR49DKp/zqRcVLmaM
iW/D3AwSYJQ=
=GvZ2
-----END PGP SIGNATURE-----