Talk:The Thirteenth Labour: Difference between revisions

From Perplex City Wiki
Jump to navigationJump to search
(Assault on 13th Labour are attacking the wrong cipher.)
 
No edit summary
Line 1: Line 1:
As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher.  They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. [[User:Ciphergoth|Ciphergoth]] 09:00, 3 June 2006 (PDT)
As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher.  They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. [[User:Ciphergoth|Ciphergoth]] 09:00, 3 June 2006 (PDT)
Comment from me:  The Assault Client was developped from the RCCRYPT package - version 1.6 to be exact.  From the first page of the Unfiction thread:
64/12/8
This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.
Each block is processed 64 bits at a time, for 12 rounds, using an 8 byte key.  The source has been verified by people who were actually involved in the original d.net assault on RC5-64.  I am not sure where your information is from - but it would appear, fortunately - to be inaccurate.
[[User:Chimera245|Chimera245]] 21:00, 5 June 2006 (PDT)

Revision as of 13:03, 5 June 2006

As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher. They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. Ciphergoth 09:00, 3 June 2006 (PDT)

Comment from me: The Assault Client was developped from the RCCRYPT package - version 1.6 to be exact. From the first page of the Unfiction thread:

64/12/8

This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.

Each block is processed 64 bits at a time, for 12 rounds, using an 8 byte key. The source has been verified by people who were actually involved in the original d.net assault on RC5-64. I am not sure where your information is from - but it would appear, fortunately - to be inaccurate.

Chimera245 21:00, 5 June 2006 (PDT)