Gisle S{lensminde wrote:
>
<snip>
> Predictable data in
> the last DES subkey would probably open up for certain attacks.
>
<snip>
meet-in-the-middle with complexity at most 2*2**54 if the last key is
known. The right way to do this would be to create a random key and use
that for encryption. However, how do you protect the random key?
Marc
--
Marc Mutz <[EMAIL PROTECTED]> http://marc.mutz.com/Encryption-HOWTO/
University of Bielefeld, Dep. of Mathematics / Dep. of Physics
PGP-keyID's: 0xd46ce9ab (RSA), 0x7ae55b9e (DSS/DH)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/