[39] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: A link encryption protocol to crytique ;-)

daemon@ATHENA.MIT.EDU (Sy Verpunc)
Thu Apr 29 10:59:23 1993

Date: Wed, 28 Apr 93 14:42:02 GMT
From: Sy Verpunc <svp@gtoal.com>
Reply-To: cypherpunks@toad.com
To: cypherpunks@toad.com

: T[i] is generated by a pseudo random process, similar to shuffling a deck of
: cards.  For each i, fill the vector with the values 0 to D-1.  Then two random
: indexes (j & k) are chosen (to be different) and the two values at
: T[i,j] and T[i,k] are swapped.  This can be iterated an arbitraty number of
: times (L) to ensure a good "shuffle" of the values.

I saw this particularly clueless statement and stopped even trying to follow
the rest of it.  Still, I made an even more stupid blunder on sci.crypt a few
weeks ago myself, so I can't criticise.  All I can say is I learned from my
mistake and will leave thinking up new crypto schemes to the experts.

G

home help back first fref pref prev next nref lref last post