[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Predicting cipher life / NSA rigged DES? ...





I had tended to not take too seriously the posts of someone who signs
himself as "Uhh...this is Joe," but the reasoning he displays below makes
me take him more seriously:

At 5:26 PM -0800 1/30/98, Uhh...this is Joe [Randall Farmer] wrote:

>Yes, I think that's what my (inaccurate) model would suggest you do, if my
>guesses as to break probability are close; real, practical cipher breaks get
>rarer after more analysis-hours pass -- i.e., ciphers are more likely to be
>broken in the first year of analysis than the tenth -- so expected lifetimes
>would increase with the amount of analysis survived.

Just so. With one minor caveat: the amount of time should be replaced by
"effort expended."

Clearly there are a lot of flaky algorithms which have been given scant
attention. It would be wrong to assume that the first year spent trying to
break Blowfish is comparable to the first year spent trying to attack
Virtual Matrix Superunbreakable Amazing Algorithm.

But I generally like your intuition.

--Tim May


The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^2,976,221   | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."