From owner-freebsd-hackers Wed Jun 18 15:10:53 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id PAA14659 for hackers-outgoing; Wed, 18 Jun 1997 15:10:53 -0700 (PDT) Received: from cypher.net (black@zen.pratt.edu [205.232.115.155]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id PAA14642 for ; Wed, 18 Jun 1997 15:10:50 -0700 (PDT) Received: (from black@localhost) by cypher.net (8.8.5/8.7.1) id SAA05128; Wed, 18 Jun 1997 18:12:26 -0400 Date: Wed, 18 Jun 1997 18:12:24 -0400 (EDT) From: Ben Black To: Jason Hudgins cc: hackers@FreeBSD.ORG Subject: Re: RSA5 Encryption Cracked.. In-Reply-To: <11F12637A8E@smtp.dancooks.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk are you certain it was the 56-bit challenge? i don't think we went through 25% of the keyspace...and their announcement said that globally 50% of the keyspace was exhausted... On Wed, 18 Jun 1997, Jason Hudgins wrote: > Heya, > I just thought some of you might be happy to know that the > Deschall project just successfully cracked an RC5 encrypted message > with a 56 bit key. The really cool thing is that it was one of the > 1-2% machines that was running FreeBSD! The majority of the > machines hacking away cpu cylces were running windows and solaris. > They found the key after searching through only 25% of the > keyspace. Even though it was really just a matter of luck, I still > that it was pretty cool. > > Jason > > > Jason L. Hudgins > Dan Cook's Web Hacker Type Person > office email: hudginsj@smtp.dancooks.com > home email: jasonh@cei.net > http://www.dancooks.com/~jason >