[3945] in WWW Security List Archive
Universal Data Cryptography Module V2.0 (fwd)
daemon@ATHENA.MIT.EDU (Murple)
Fri Jan 10 00:14:28 1997
From: Murple <btherl@ikkles.cs.mu.oz.au>
To: www-security@ns2.rutgers.edu
Date: Fri, 10 Jan 1997 06:05:02 +1100 (EST)
Reply-To: btherl@ariel.ucs.unimelb.edu.au
Errors-To: owner-www-security@ns2.rutgers.edu
> Hello,
>
> Greetings! I am Jeremy K. Yu-Ramos, president of DataET Research, Data
> Engineering Technologies. I am sending you this message to let you know that
> DataET Research has recently initiated the distribution of UDCM, Universal
> Data Cryptography Module. UDCM implements a revolutionarily new, extremely
> advanced and sophisticated, digital data encryption algorithm named IMDMP,
> Integrated Mathematical Data Manipulation and Positioning. Extensive research
> shows that IMDMP is more advanced than DES, RSA, IDEA, and PGP.
IMDMP is more advanced than RSA, yet it does not support public keys.. hmm..
> UDCM (the IMDMP algorithm)...
>
> o Is a royalty-free Windows DLL module featuring advanced cryptography.
And Windows is the only OS?
> o Contains more than 140 procedures and functions.
This is good?
> o Is a very cost-effective size of only 57 kilobytes.
Wow.
> o Implements the IMDMP encryption algorithm.
You don't say..
> o Is more advanced than all of the industry standard encryption algorithms.
And as a matter of fact, I have a bridge to sell you..
> o Allows encryption keys as large as 256 bytes (2048 bits).
I could AND my data with 256 bytes of 1s, and achieve absolutely nothing..
> o Includes 18 sub-algorithms.
How nice.
> o Processes all forms of binary and ASCII files.
> o Allows multiple encryption layer levels.
> o Has absolutely no back-doors or magical keys.
NO programs have back-doors or magical keys :)
> o Does not store encryption keys in files.
> o Processes files as large as 2,147,483,390 bytes.
These have nothing to do with the algorithm. They are only relevant because
the algorithm has not been made public, which is (partially) why no-one will
take you seriously.
> o Has a 100% data preservation rating.
So does every encryption algorithm!?
> o Includes Y2K compliant time and date locking features.
I don't know what this is, nor do I care..
> o Has NCSC compliant data cleaning and wiping capabilities.
> o Includes file specific unique encryption features.
> o Includes file authentication guard features.
> o Includes unique encryption signaturing features.
> o Includes data importance and sensitivity stamping features.
Also UDCM, and not IMDMP - if you made the algorithm public, these features
could be improved upon by developers around the world.
> UDCM can be accessed through programs developed with popular application and
> database programming languages and environments such as: C, C++, Visual
> Basic, PowerBuilder, Delphi, OOP Pascal, Turbo Pascal, SmallTalk, dBase,
> Paradox, Access, Sybase, Oracle, etc.
Bleh. ibid.
> DataET Research has released a shareware version of UDCM named UDCM V2.0.
>
> To download UDCM V2.0 for free, please go to:
> http://members.aol.com/dataetrsch/udcm.html.
>
> I hope you will consider applying UDCM in the software you develop. Thank-you
> very much for your time.
>
> Sincerely,
>
> Jeremy K.Yu-Ramos
> President
> DataET Research
> Data Engineering Technologies
The scary thing is, that some people will believe him - some people will buy
his snake oil, and he may even make money out of this if he can convince
some similarly ill-informed corporate-type to buy his algorithm.. All we can
do is educate ourselves, and educate others, so that people like him and his
company get what they deserve.