Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Jun 1997 18:12:24 -0400 (EDT)
From:      Ben Black <black@zen.cypher.net>
To:        Jason Hudgins <hudginsj@smtp.dancooks.com>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: RSA5 Encryption Cracked..
Message-ID:  <Pine.LNX.3.91.970618181122.1835D-100000@zen.cypher.net>
In-Reply-To: <11F12637A8E@smtp.dancooks.com>

next in thread | previous in thread | raw e-mail | index | archive | help
are you certain it was the 56-bit challenge?  i don't think we went 
through 25% of the keyspace...and their announcement said that globally 
50% of the keyspace was exhausted...

On Wed, 18 Jun 1997, Jason Hudgins wrote:

> Heya,
>     I just thought some of you might be happy to know that the
> Deschall project just successfully cracked an RC5 encrypted message
> with a 56 bit key.  The really cool thing is that it was one of the
> 1-2% machines that was running FreeBSD! The majority of the
> machines hacking away cpu cylces were running windows and solaris.
>     They found the key after searching through only 25% of the
> keyspace.  Even though it was really just a matter of luck, I still
> that it was pretty cool.
> 
> Jason
> 
>     
> Jason L. Hudgins
> Dan Cook's Web Hacker Type Person
> office email: hudginsj@smtp.dancooks.com
> home email: jasonh@cei.net
> http://www.dancooks.com/~jason
> 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.91.970618181122.1835D-100000>