Re: DES <weak> key list?

"Michael C. Richardson" <mcr@sandelman.ottawa.on.ca> Wed, 10 September 1997 14:01 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id KAA05542 for ipsec-outgoing; Wed, 10 Sep 1997 10:01:26 -0400 (EDT)
Message-Id: <199709101414.KAA15328@istari.sandelman.ottawa.on.ca>
To: ipsec@tis.com
Subject: Re: DES <weak> key list?
In-reply-to: Your message of "Wed, 10 Sep 1997 09:37:19 EDT." <3.0.3.32.19970910093719.0076d728@pop3.pn.com>
Date: Wed, 10 Sep 1997 10:14:11 -0400
From: "Michael C. Richardson" <mcr@sandelman.ottawa.on.ca>
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "Rodney" == Rodney Thayer <rodney@sabletech.com> writes:
    Rodney> If we don't need the Possibly Weak list, we can just make
    Rodney> all three docs point at Schneier, "and of course you
    Rodney> should consult the current literature for any changes in
    Rodney> this".
  
  Couldn't we just publish an informational RFC with all the
possibilities listed, and point at *that*? Maybe one of the
cryptographers will author it and provide a couple of paragraphs on
why each set of keys is considered weak.
  This is clearly cryptography, not network protocol design, so let
the experts argue over this document rather than doing it here.

   :!mcr!:            |  Network security programming, currently
   Michael Richardson | on contract with DataFellows F-Secure IPSec
 WWW: <A HREF="http://www.sandelman.ottawa.on.ca/People/Michael_Richardson/Bio.html">mcr@sandelman.ottawa.on.ca</A>. PGP key available.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: latin1
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQB1AwUBNBarL6ZpLyXYhL+BAQFppgL9EQAk8QBxIQTlBZFsQHFGr6gYgICUK6+Z
57W4yw962tnorGLchTYZVRmo1R5eaLAwmCFax7K4LWE4zuHsLWqWBi0+/9jkTdMu
0s3qKUMeW2onCrwhe92uzWIBz8vyQ9/V
=o6Yh
-----END PGP SIGNATURE-----