sorry it was rejected the first time so there might be some garbage in it
Whow, I'd have to check that :-) any crypto people here? :-) bitwise 56 is >
40. Mathematically it would take a lot less time to brute force 40 bit than
it would 56 bit.
40 bit = (2^40) 1.0995116278e+12 (1.099.511.627.800 possible options)
56 bit = (2^56) 7.2057594038e+16 (72.057.594.038.000.000 possible options)
I'm am no crypto expert whatsoever, but it looks to me like you're done a lot
faster if you only have to test for only 1.099.511.627.800 keys than for
72.057.594.038.000.000. The 56bit keys were cracked under 22 hours several
times far as I know. Ofcourse this is also a quesion of luck. You might be a
real lucky ass and get the correct key the first try. Then again you might be
an unlucky ass and get the key at the last one to try.....
Once again, I'm NO crypto expert whatsoever. But it appears to me that 40bit
encryption can't have more keys than that fit in 40 bits? Then again, maybe
they mix several alghorythms........ I'd have to check.. I'm also sending
this to distributed.net mailing lists. There are some crypto experts there,
maybe they can shed some light on it.
> Hang on, correct me if I'm wrong, but isn't 56bit DES significantly
> different from 40-bit SSL (which uses a 40bit key for the public key
> crypto and something like a 3000bit key for the symmetric cipher used for
> the actual data transfer).
> What I mean is, DES is significantly weaker than the weakest part of
> standard 40bit SSL yes?
> If I'm wrong, arent a lot of people putting a lot of confidence in
> something that really isnt secure (i.e. all SSL sessions...)??
PHP General Mailing List (http://www.php.net/)
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]