CDR: Re: Permutations in DES
David Honig
honig at sprynet.com
Fri Sep 8 08:19:05 PDT 2000
At 08:02 PM 9/7/00 -0400, Kevin Elliott wrote:
>Does this method work for apps that are generating and testing lots
>of keys or does the initial key generation step still have to be
>undertaken? The whole point of the blowfish technique was to
>increase the attackers required effort. It was basicly assumed that
>valid users would simply store the expanded key. Is their a link
>somewhere to more information on this technique or could you expand
>on it?
>--
Kevin if you haven't, read the DES Crack book, its online too.
More information about the cypherpunks-legacy
mailing list