Subject: misc/1542: bdes(1) contains (now false) information
To: None <email@example.com>
From: None <firstname.lastname@example.org>
Date: 09/29/1995 03:50:59
>Synopsis: bdes(1) contains (now false) information
>Responsible: misc-bug-people (Misc Bug People)
>Arrival-Date: Fri Sep 29 00:20:04 1995
>Originator: Bill Sommerfeld
System: NetBSD orchard.medford.ma.us 1.0A NetBSD 1.0A (ORCHARD) #2: Mon Sep 25 23:26:59 EDT 1995 email@example.com:/u1/jsys/sys/arch/i386/compile/ORCHARD i386
The following paragraph is quite dated:
The DES is considered a very strong cryptosystem, and
other than table lookup attacks, key search attacks, and
Hellman's time-memory tradeoff (all of which are very
expensive and time-consuming), no cryptanalytic methods
for breaking the DES are known in the open literature. No
doubt the choice of keys and key security are the most
vulnerable aspect of bdes.
Talk to a cryptographer :-).
DES is no longer considered "very strong"; there are a number of
known cryptanalytic attacks which aren't particularly practical,
but the 56-bit keyspace is vulnerable to exhaustive search.