Re: Slicing and dicing

Karl Fox <karl@Ascend.COM> Fri, 12 September 1997 19:55 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id PAA09708 for ipsec-outgoing; Fri, 12 Sep 1997 15:55:22 -0400 (EDT)
Date: Fri, 12 Sep 1997 13:03:32 -0700
Message-Id: <199709122003.NAA11338@gump.eng.ascend.com>
From: Karl Fox <karl@Ascend.COM>
To: Cheryl Madson <cmadson@cisco.com>
Cc: Dan.McDonald@Eng.Sun.Com, mcr@sandelman.ottawa.on.ca, ipsec@tis.com
Subject: Re: Slicing and dicing
In-Reply-To: <199709121921.MAA12951@trix.cisco.com>
References: <199709121828.LAA13256@kebe.eng.sun.com> <199709121921.MAA12951@trix.cisco.com>
Reply-To: Karl Fox <karl@Ascend.COM>
Organization: Ascend Communications
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

Cheryl Madson writes:
> I also didn't catch *what* would be the definitive reference 
> for listing weak/semi-weak/possibly-weak keys, since some folks 
> claim that Schneier is in error.

Summarizing the statements made to this list (I'll not comment on
whether or not that might be authoritative), Schneier is correct in
every entry except the one with an "F0" byte, which simply has the
wrong parity.
-- 
Karl Fox, servant of God, employee of Ascend Communications
655 Metro Place South, Suite 370, Dublin, Ohio  43017   +1 614 760 4041