According to Steve Gibson, on his "Security Now!" podcast, episode 0x0100:
http://wiki.twit.tv/wiki/Security_Now_256
the supposed hack was a case of reverse engineering to reproduce the internal
keys and initialization vectors  needed to build a Skype-compatible client, and 
not a break
of RC4 per se.

The loooooooooong podcast, 1 hour 54 minutes, is at 
http://media.grc.com/sn/sn-256.mp3
The "Skype crack" discussion lasts a bit more than 7 minutes,
starting around the 33:00 time mark.

A transcript is posted here:
http://www.grc.com/sn/sn-256.pdf
The discussion starts on page 12, paragraph 4.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to