-----BEGIN PGP SIGNED MESSAGE----- cpunks, i was thinking about the recent Clinton/LEA proposal regarding exportable crypto. the new rules would allow 64 bit keys to be exported, as long as the master key was made available through some key escrow service. now, we know it is relatively easy to break a 40 bit key. additionally, we know it is nearly impossible to break 128 bits. i'm not so sure how hard 64 bits is (need to brush up on that ol' mathematics some time...). why did the govt pick 64 bits? is this length still within the range of the NSA if they really wanted to read something but didn't feel the need or want the exposure of obtaining a key from escrow? i'm curious if anyone thinks this gives us a little more info on the capabilities of the NSA regarding brute forcing a key. additionally, since this *is* an escrow system, why didn't the gov't just go with the unbreakable 128 bit key length? - -pjf patrick finerty = zinc@zifi.genetics.utah.edu = pfinerty@nyx.cs.du.edu U of Utah biochem grad student in the Bass lab - zinc fingers + dsRNA! ** FINGER zinc-pgp@zifi.genetics.utah.edu for pgp public key - CRYPTO! zifi runs LINUX 1.2.11 -=-=-=WEB=-=-=-> http://zifi.genetics.utah.edu -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMDYyb03Qo/lG0AH5AQGhDwP/c2NmiU3IwQSAPuYyFgLG3o8Tc+8i9v7b j8+vdT9wwmBM0hMXtIya6Dnb9hHo+oyBJkL+70N44sV7gy+J6LlZQcY/dNICAdD5 lEJ67YEfKp5Mb010MljsEcwMEIhjZ/IWrhSZipg4rkfIutXCIj6iNvOtOgi9WjKW wz1j7FimJpI= =1j3L -----END PGP SIGNATURE-----