At 16:30 10/17/96 +0100, Adam Back wrote:
[added cc cypherpunks also]
Sameer Parekh <sameer@c2.org> writes:
Peter Trei <trei@process.com> writes:
Ideally, this should be a DEMO case of a real world encrypted application, in which we have a cryptotext, and a known plaintext, each at least one 8-byte block long.
I'd like to get in touch with a bank who can provide us some sample ciphertext for an ATM transaction or something like that. I initially thought we should hit SWIFT, but that would be very illegal. =)
If someone can dig up a selection of banking protocols (some of these things must be standardised), perhaps we can simulate the same thing without the legal implications.
Of course you'd need the person constructing the challenge to be trustworthy to the tune of $10k, or whatever the prize fund pans out to be. For that matter the NSA, or anyone else with a hardware breaker would be able to cheat, but then they help our cause, which is to demonstrate how weak DES is :-)
Tell me what you need. A large part of my job is providing hardware security modules to banks to secure (among other things) their ATM networks (Automated Teller MAchines, not Async Transfer Mode). Do you need PIN encryption formats, transmission message protocols, or what? Just LMK. G.C.G. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Geoffrey C. Grabow | Great people talk about ideas. | | Oyster Bay, New York | Average people talk about things. | | gcg@pb.net | Small people talk about people. | |----------------------------------------------------------------------| | PGP 2.6.2 public key available at http://www.pb.net/~wizard | | and on a plethora of key servers around the world. | | Key ID = 0E818EC1 | | Fingerprint = A6 7B 67 D7 E9 96 37 7D E7 16 BD 5E F4 5A B2 E4 | |----------------------------------------------------------------------| | That which does not kill us, makes us stranger. - Trevor Goodchild | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~