Gisle S{lensminde wrote:
>
<snip>
> Predictable data in
> the last DES subkey would probably open up for certain attacks.
>
<snip>
meet-in-the-middle with complexity at most 2*2**54 if the last key is
known. The right way to do this would be to create a random key and use
that for encryption. However, how do you protect the random key?
Marc
-- Marc Mutz <Marc@Mutz.com> http://marc.mutz.com/Encryption-HOWTO/ University of Bielefeld, Dep. of Mathematics / Dep. of PhysicsPGP-keyID's: 0xd46ce9ab (RSA), 0x7ae55b9e (DSS/DH)
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sat Sep 23 2000 - 21:00:27 EST