Well, Greg Rose just left (sigh), and while part of the reason was the a
large amount of traffic between a crank and his detractors, the other part
was that there wasn't much traffic other than that.
So, I thought I'd mention something that was on-topic; some research I've
been doing.
Someone (Ixgr from
crypto.stackexchange.com; I don't know his (or her) real
name) suggested to me that, because of the known distinguishers on RC4, that
if you were given a large number of encypted messages which all had the same
plaintext, you might be able to recover the plaintext. The scenario that he
was thinking of was an SSH-protected login sequence; where the two sides
negotiate a set of random RC4 keys, and then exchange passwords encrypted
with RC4. The idea is that the password appears in exactly the same
position in the encrypted stream; if you could record a large number of
encrypted exchanges, could you recover the password.
So, what I did was pick a password of 16 characters, and encrypted that with
a large number of keys (using RC4/Drop-512; that is, I would discard the
first 512 bytes of the RC4 key stream, to avoid the known analomilies at the
start of the keystream).
I then collected statistics on all those encrypted messages, and by using
the known RC4 variances from randomness in
http://www.mindspring.com/~dmcgrew/rc4-03.pdf (table 3, in particular), I
was able to recover the password with 8 billion encrypted messages.
8 billion encrypted streams are a lot; however, I was able to get some
partial information (correct guesses on, say, a 4 character subset of the
password) after 4 billion encrypted streams.
Because of this, it would sound prudent to avoid RC4 if you're going to
protect the same login sequence a huge number of times. Now, it might be
prudent to avoid RC4 altogether; this just demonstrates yet another
vulnerability.
I'll be writing up an eprint summary on this.
--
poncho