Hello there!Re: Where does your data want to go today?
Anonymous
nobody at REPLAY.COM
Sat Jun 1 19:58:32 PDT 1996
Someone who claimed to be David F. Ogren said on Sat, 1 Jun 1996:
> > The brute force system decrypts the first, and second blocks (8
> > bytes each) of the cyphertext, XORs them, and compares the result
> > with "PKZIP2.1". If the comparison is equal it has the key.
> I will concede that having a known header, such as a PKZIP header,
> does weaken a crypto to certain degree, but I still believe that it is
> not a significant problem. Here's why:
Why not simply use two session keys, and encrypt the headers with one
while encrypting the actual data with the other? That seems to solve both
problems, except that more CPU cycles are required.
More information about the cypherpunks-legacy
mailing list