[3946] in WWW Security List Archive
RE: Universal Data Cryptography Module V
daemon@ATHENA.MIT.EDU (Davidson, Clyde)
Fri Jan 10 13:19:00 1997
Date: Fri, 10 Jan 1997 09:01:00 -0600
From: "Davidson, Clyde" <CDAVIDSO@is.nmh.nmh.org>
To: www-security <www-security@ns2.rutgers.edu>,
btherl <btherl@ariel.ucs.unimelb.edu.au>
Errors-To: owner-www-security@ns2.rutgers.edu
While is algorithm may not be proven, do you know that it is faulty,
unworkable, or insecure in any way?
Clyde Davidson
----------
From: btherl[SMTP:btherl@ariel.ucs.unimelb.edu.au]
Sent: Friday, January 10, 1997 1:54 AM
To: www-security
Subject: Universal Data Cryptography Module V2.0
> Hello,
>
> Greetings! I am Jeremy K. Yu-Ramos, president of DataET Research, Data
> Engineering Technologies. I am sending you this message to let you know
that
> DataET Research has recently initiated the distribution of UDCM,
Universal
> Data Cryptography Module. UDCM implements a revolutionarily new,
extremely
> advanced and sophisticated, digital data encryption algorithm named
IMDMP,
> Integrated Mathematical Data Manipulation and Positioning. Extensive
research
> shows that IMDMP is more advanced than DES, RSA, IDEA, and PGP.
IMDMP is more advanced than RSA, yet it does not support public keys..
hmm..
> UDCM (the IMDMP algorithm)...
>
> o Is a royalty-free Windows DLL module featuring advanced cryptography.
And Windows is the only OS?
> o Contains more than 140 procedures and functions.
This is good?
> o Is a very cost-effective size of only 57 kilobytes.
Wow.
> o Implements the IMDMP encryption algorithm.
You don't say..
> o Is more advanced than all of the industry standard encryption
algorithms.
And as a matter of fact, I have a bridge to sell you..
> o Allows encryption keys as large as 256 bytes (2048 bits).
I could AND my data with 256 bytes of 1s, and achieve absolutely
nothing..
> o Includes 18 sub-algorithms.
How nice.
> o Processes all forms of binary and ASCII files.
> o Allows multiple encryption layer levels.
> o Has absolutely no back-doors or magical keys.
NO programs have back-doors or magical keys :)
> o Does not store encryption keys in files.
> o Processes files as large as 2,147,483,390 bytes.
These have nothing to do with the algorithm. They are only relevant
because
the algorithm has not been made public, which is (partially) why no-one
will
take you seriously.
> o Has a 100% data preservation rating.
So does every encryption algorithm!?
> o Includes Y2K compliant time and date locking features.
I don't know what this is, nor do I care..
> o Has NCSC compliant data cleaning and wiping capabilities.
> o Includes file specific unique encryption features.
> o Includes file authentication guard features.
> o Includes unique encryption signaturing features.
> o Includes data importance and sensitivity stamping features.
Also UDCM, and not IMDMP - if you made the algorithm public, these
features
could be improved upon by developers around the world.
> UDCM can be accessed through programs developed with popular
application and
> database programming languages and environments such as: C, C++, Visual
> Basic, PowerBuilder, Delphi, OOP Pascal, Turbo Pascal, SmallTalk,
dBase,
> Paradox, Access, Sybase, Oracle, etc.
Bleh. ibid.
> DataET Research has released a shareware version of UDCM named UDCM
V2.0.
>
> To download UDCM V2.0 for free, please go to:
> http://members.aol.com/dataetrsch/udcm.html.
>
> I hope you will consider applying UDCM in the software you develop.
Thank-you
> very much for your time.
>
> Sincerely,
>
> Jeremy K.Yu-Ramos
> President
> DataET Research
> Data Engineering Technologies
The scary thing is, that some people will believe him - some people will
buy
his snake oil, and he may even make money out of this if he can convince
some similarly ill-informed corporate-type to buy his algorithm.. All we
can
do is educate ourselves, and educate others, so that people like him and
his
company get what they deserve.