>It is my understanding that if bytes 1..8 yield a weak key that you toss >that 'slice' and go on, so it would use bytes 9..16. My take is to try bytes 2..9 if 1..8 are weak (I inherited some code that does it that way). I guess the text needs to be more specific. -dave