According to Steve Gibson, on his "Security Now!" podcast, episode 0x0100: http://wiki.twit.tv/wiki/Security_Now_256 the supposed hack was a case of reverse engineering to reproduce the internal keys and initialization vectors needed to build a Skype-compatible client, and not a break of RC4 per se.
The loooooooooong podcast, 1 hour 54 minutes, is at http://media.grc.com/sn/sn-256.mp3 The "Skype crack" discussion lasts a bit more than 7 minutes, starting around the 33:00 time mark. A transcript is posted here: http://www.grc.com/sn/sn-256.pdf The discussion starts on page 12, paragraph 4. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com