Guest Deleted_Account Posted July 13, 2010 Share Posted July 13, 2010 I was reading the post on http://www.enrupt.com/index.php/2010/07/07...secret-revealed and thought all was sound but then saw this part: There are seven types of communication encryption in Skype: its servers use AES-256, the supernodes and clients use three types of RC4 encryption - the old TCP RC4, the old UDP RC4 and the new DH-384 based TCP RC4, while the clients also use AES-256 on top of RC4 okay so am I misunderstanding, is AES not implemented properly or is this guy actually claiming to have cracked AES-256 bit ontop of RC4? and also i thought RC4 (obviously not skypes variant) was cracked along time ago? as in: In 2005, Andreas Klein presented an analysis of the RC4 stream cipher showing more correlations between the RC4 keystream and the key. Erik Tews, Ralf-Philipp Weinmann, and Andrei Pychkine used this analysis to create aircrack-ptw, a tool which cracks 104-bit RC4 used in 128-bit WEP in under a minute. Whereas the Fluhrer, Mantin, and Shamir attack used around 10 million messages, aircrack-ptw can break 104-bit keys in 40,000 frames with 50% probability, or in 85,000 frames with 95% probability. from Wikipedia so am i missing something? or is it just the variant/implimentation skype is using? The way it's worded it sounds like he is claiming to have cracked AES-256 bit (Yah right. That is VERY unlikely) Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.