[66361] in Cypherpunks
WARNING: This Message Actually Contains a Question Reguarding Crypto!
daemon@ATHENA.MIT.EDU (William H. Geiger III)
Tue Sep 24 19:18:48 1996
From: "William H. Geiger III" <whgiii@amaranth.com>
Date: Tue, 24 Sep 96 11:34:22 -0500
To: cypherpunks@toad.com
Hi,
I just recently downloaded copies of Blowfish & Ghost.
Does anyone have any experiance with these two algorithims?
How do they comare to RSA, DES, 3DES, IDEA ?
I can across a post awhile back that mentioned that they were using Blowfish in
PGPPhone. Can anyone confirm this?
Does anyone know how they are using Blowfish and why?
Thanks,
--
-----------------------------------------------------------
William H. Geiger III http://www.amaranth.com/~whgiii
Geiger Consulting WebExplorer & Java Enhanced!!!
Merlin Beta Test Site - WarpServer SMP Test Site
Author of PGPMR2 - PGP Front End for MR/2 Ice
Look for MR/2 Tips & Rexx Scripts
Get Work Place Shell for Windows!!
PGP & MR/2 the only way for secure e-mail.
Finger whgiii@amaranth.com for PGP Key and other info
-----------------------------------------------------------