Columbia crypto box

Steven M. Bellovin smb at research.att.com
Mon Feb 10 20:01:07 EST 2003


In message <v03110708ba6df9a4efb3@[192.168.1.5]>, Bill Frantz writes:
>At 4:29 PM -0800 2/10/03, Steven M. Bellovin wrote:
>>In message <v03110705ba6dec92ddb0@[192.168.1.5]>, Bill Frantz writes:
>>
>>>  * Fast key setup (Forget tossing the 256 bytes of key stream.
>>>    The designers weren't crypto engineers.  Personally, I'd toss the
>>>    first 1024.)
>>
>>...
>>
>>There may be a cryptographically sound reason to discard that much, but
>>it's not without cost.
>
>The reason I would discard so much is that when I did some statistics on
>RC4 output, I kept getting distribution lumps out to about 1024.  They made
>me worry about what someone who knew what were doing could do.
>

That's a good reason...  (At that point, even with older hardware, AES 
might be better -- and of course, using a block cipher solves lots of 
other problems, too...)

		--Steve Bellovin, http://www.research.att.com/~smb (me)
		http://www.wilyhacker.com (2nd edition of "Firewalls" book)



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list