Subject: misc/1543: bdes(1) contains (now false) information
To: None <gnats-bugs@gnats.netbsd.org>
From: None <sommerfeld@orchard.medford.ma.us>
List: netbsd-bugs
Date: 09/29/1995 03:50:59
>Number:         1543
>Category:       misc
>Synopsis:       bdes(1) contains (now false) information
>Confidential:   no
>Severity:       serious
>Priority:       low
>Responsible:    misc-bug-people (Misc Bug People)
>State:          open
>Class:          doc-bug
>Submitter-Id:   net
>Arrival-Date:   Fri Sep 29 02:35:02 1995
>Last-Modified:
>Originator:     Bill Sommerfeld
>Organization:
	
>Release:        950927
>Environment:
	
System: NetBSD orchard.medford.ma.us 1.0A NetBSD 1.0A (ORCHARD) #2: Mon Sep 25 23:26:59 EDT 1995 sommerfe@orchard.medford.ma.us:/u1/jsys/sys/arch/i386/compile/ORCHARD i386


>Description:

The following paragraph is quite dated:

       The DES is considered  a  very  strong  cryptosystem,  and
       other  than  table lookup attacks, key search attacks, and
       Hellman's time-memory tradeoff  (all  of  which  are  very
       expensive  and  time-consuming),  no cryptanalytic methods
       for breaking the DES are known in the open literature.  No
       doubt  the  choice  of  keys and key security are the most
       vulnerable aspect of bdes.


>How-To-Repeat:
	N/A
>Fix:
	Talk to a cryptographer :-).

	DES is no longer considered "very strong"; there are a number of 
	known cryptanalytic attacks which aren't particularly practical,
	but the 56-bit keyspace is vulnerable to exhaustive search.

>Audit-Trail:
>Unformatted: