[665] in Cypherpunks

home help back first fref pref prev next nref lref last post

Data Insecurity Packages, etc.

daemon@ATHENA.MIT.EDU (Eric Hughes)
Sat May 29 01:19:11 1993

Date: Fri, 28 May 93 09:26:17 -0700
From: Eric Hughes <hughes@soda.berkeley.edu>
To: wixer!wixer.bga.com!meyer@cactus.org
Cc: cypherpunks@toad.com
In-Reply-To: meyer's message of Wed, 26 May 93 22:14:49 CDT <9305270314.AA05215@wixer>

>It has also been examined by four cryptologists (professional and/or
>credentialed) not involved in its development, and it was ridiculed
>by none of them.

I hear the sounds of autonecrothaphty (digging one's own grave).  Was
it recommended by any of them, and did any of the test it?

>The first task of a cryptanalyst
>is to discover what method of encryption was used. 

Usually not.  This often comes as collateral information related to
the intercept.  In the case of a PC seizure, having a manual lying
around and an executable on the disk usually qualifies.

Eric



home help back first fref pref prev next nref lref last post