From owner-freebsd-hackers Tue Apr 15 23:40:38 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id XAA17118 for hackers-outgoing; Tue, 15 Apr 1997 23:40:38 -0700 (PDT) Received: from vital.bleeding.com (vital.bleeding.com [205.166.195.252]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id XAA17108 for ; Tue, 15 Apr 1997 23:40:33 -0700 (PDT) Received: from crimson (crimson.bleeding.com [205.166.254.2]) by vital.bleeding.com (8.8.5/8.8.5) with SMTP id XAA21106; Tue, 15 Apr 1997 23:37:38 -0700 (PDT) Received: by crimson with Microsoft Mail id <01BC49F6.CCE56760@crimson>; Tue, 15 Apr 1997 23:43:20 -0700 Message-ID: <01BC49F6.CCE56760@crimson> From: Justin Wolf To: "'cmcurtin@research.megasoft.com'" , Golan Klinger Cc: "rsacrack@vex.net" , "hackers@freebsd.org" , "deschall@gatekeeper.megasoft.com" Subject: RE: First place. Date: Tue, 15 Apr 1997 23:43:19 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by freefall.freebsd.org id XAA17113 Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk You actually think that DES is too weak when it takes all the hackers in the known unix world to stage an attempt which has been so far unsuccessful? Hmm... different point of view I guess. -Justin Wolf (jjwolf@bleeding.com) -----Original Message----- From: C Matthew Curtin [SMTP:cmcurtin@research.megasoft.com] Sent: Tuesday, April 15, 1997 11:25 PM To: Golan Klinger Cc: rsacrack@vex.net; hackers@freebsd.org; deschall@gatekeeper.megasoft.com Subject: Re: First place. > Name/Address Blocks Time Last Avg > Done Working Checked-in Mkeys/sec1 > > rsacrack@vex.net 38384 19.8 days 22 secs ago 6.032 > crackerz@best.net 38205 19.8 days 1 mins ago 6.01 > Wwe're in first now. Regarding the suggestion to switch to the > Deschall and Brydder clients, sure, why not? Where are they? No use > stopping and joining another effort when we're in first place, > right? First place of what? :-) We (the deschall group) are doing > 500Mkeys/sec. Plus, we'll soon be able to traverse firewalls, which we hope will significantly increase the number of available clients. Our status reports are available at http://www.frii.com/~rcv/desstat.htm Stop playing around with <10Mkeys/sec and join us. :-) That's a lot of keys, but if everyone can coordinate their efforts together, the faster we'll get through the keyspace and prove that DES is too weak for real applications... -- Matt Curtin Chief Scientist Megasoft, Inc. cmcurtin@research.megasoft.com http://www.research.megasoft.com/people/cmcurtin/ I speak only for myself Death to small keys. Crack DES NOW! http://www.frii.com/~rcv/deschall.htm