![]() |
ePeen duel!!
Answer the age-old question about where we can download a 56k modem, and we'll throw in a special Mantra shield. |
its ironic because you need a modem to download the 56k modem to begin with....a classic chicken and the egg problem!!!!
|
Quote:
Weird... Then again, I think if the chicken came first, it has much better chances, since wtf layed AND hatched the egg. It's like 2-1 ratio or whatever. |
Quote:
I actually laughed at this, nay, I guffawed. Thank you crazy gay mexican man. |
well in case anyone is wondering what the fuck (and i know you scrubs arent) is wrong with the algorithm:
the state of the current stream byte is 40 bits, but only 2^32 of those will correspond to the actual output byte...keeping in mind that the next generated byte uses two of the previous state bytes, you can mount a differential attack based on the elimination of the possible states of those 2 bytes based on the previous stream byte, and so on to the next byte and so on. in the end i estimate you'd need around 2^50 work and a few kb of known plaintext to break it another weakness is the key schedule, which doesn't do enough mixing and thus a related key attack is possible for very long keys easiest fix: do feed-forward after mixing better fix: fuck you grav!! |
All times are GMT -6. The time now is 02:03 PM. |
Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
This site is best seen with your eyes open.