CDR: Re: Permutations in DES

David Honig honig at sprynet.com
Fri Sep 8 08:19:05 PDT 2000


At 08:02 PM 9/7/00 -0400, Kevin Elliott wrote:
>Does this method work for apps that are generating and testing lots 
>of keys or does the initial key generation step still have to be 
>undertaken?  The whole point of the blowfish technique was to 
>increase the attackers required effort.  It was basicly assumed that 
>valid users would simply store the expanded key.  Is their a link 
>somewhere to more information on this technique or could you expand 
>on it?
>-- 

Kevin if you haven't, read the DES Crack book, its online too.









  









More information about the cypherpunks-legacy mailing list