Re: Plaintext

Christopher Dickens (cdickens@ntr.net)
Wed, 2 Jul 1997 20:02:51 -0400 (EDT)


On Wed, 2 Jul 1997, Stephen Langasek wrote:

> On Wed, 2 Jul 1997, Trent Piepho wrote:
>
> > On Wed, 2 Jul 1997, Timothy C. Hagman wrote:
> > > Nelson Minar penned, off the top of the head:
> > > > entropy to prevent analysis on the plaintext. What do you do in that
> > > > circumstance?
> > >
> > > Find the holder of the passphrase, point a gun at him or her, and
> > > demand it. Cheap, effective, and nearly always yields results.
> > > (And most major governments can afford guns ;)
> >
> > The gun isn't even necessary. Just call them up and say you're from net ops
> > or something. All this talk about attacking cryptographic algorithms is kind
> > of silly, since the weak link by far is people. It would have been much
> > faster to brute force open the desk at RSA where someone wrote the key down.
>
> True enough, but while it might even have gotten someone the prize money
> (time to solve: 15 seconds, equipment used: one crowbar), it wouldn't have
> been nearly as useful from a political perspective. :)

Not necessarily... 8-) Unless RSA wanted to look like their facility was
vulnerable, wouldn't tell anyone, then the user could simply drop a hint
in Rocke's mailbox of which keyblock section to dish out next to receive
the winning prize right away.

CRACK RC5 NOW!!! http://rc5.distributed.net/index.html
----------------------------------------------------------------------
Christopher Dickens - cdickens@ntr.net - SGI O2 Powered!!!
----------------------------------------------------------------------
<http://www.ntr.net/~cdickens>
Copyright (c) 1997 by Christopher Dickens. All Rights Reserved.

NOTE: Everything disclosed is the sole opinion of Christopher Dickens
and in no way reflects the views or opinions, either in whole
or part, of NTR.NET Corporation or any of it's affiliates.